Using code bloat to obfuscate evolved network traffic

Research output: Chapter in Book/Report/Conference proceedingConference contribution

4 Citations (Scopus)

Fingerprint

Dive into the research topics of 'Using code bloat to obfuscate evolved network traffic'. Together they form a unique fingerprint.

Keyphrases

Computer Science