Undermining Information Hiding (And What to do About it).

Summary

This is a publication. If there is no link to the publication on this page, you can try the pre-formated search via the search engines listed on this page.

Authors: Goktas, R. Gawlik, B. Kollenda, E. Athanasopoulos, G. Portokalidis, C. Giuffrida, H. Bos

Journal title: USENIX Security Symposium

Journal publisher: USENIX

Published year: 2016