H Seong, I Kim, Y Jeon, MK Oh, S Lee… - IEEE Internet of Things …, 2022 - ieeexplore.ieee.org
Covert communications, or covert channels, are commonly exploited to establish a data
exfiltration channel from an insider on a trusted network to a malicious receiver outside the …