Abstract

This report will provide basic information on the network steganography method based on deliberate time delays. The main attention will be paid to the description of this method, its features, practical implementation and detection methods. As a result, two main methods of detecting this method are described, as well as the experimental implementation of one of them.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call