Abstract
Covert channels provide a secret communication medium between two malicious processes to exfiltrate information stealthily that violates the security ......
小提示:本篇文献需要登录阅读全文,点击跳转登录