All Stories

  1. Analysis of network traffic hiding techniques in modern malware (computer viruses)
  2. A Case Study on the Detection of Hash-Chain-based Covert Channels Using Heuristics and Machine Learning