Abstract
This report will provide basic information on the network steganography method based on deliberate time delays. The main attention will be paid to the description of this method, its features, practical implementation and detection methods. As a result, two main methods of detecting this method are described, as well as the experimental implementation of one of them.
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have