Skip navigation
Please use this identifier to cite or link to this item: https://libeldoc.bsuir.by/handle/123456789/63475
Full metadata record
DC FieldValueLanguage
dc.contributor.authorDuong Ngoc Anti-
dc.contributor.authorDao Thanh Huong-
dc.coverage.spatialМинскen_US
dc.date.accessioned2026-04-29T08:06:14Z-
dc.date.available2026-04-29T08:06:14Z-
dc.date.issued2026-
dc.identifier.citationDuong Ngoc Anti. Detecting cyber-attacks based on network steganography / Duong Ngoc Anti, Dao Thanh Huong // Технические средства защиты информации : материалы ХXIV Международной научно-технической конференции, Минск, 8 апреля 2026 года / Белорусский государственный университет информатики и радиоэлектроники [и др.] ; редкол.: О. В. Бойправ [и др.]. – Минск, 2026. – С. 232–236.en_US
dc.identifier.urihttps://libeldoc.bsuir.by/handle/123456789/63475-
dc.description.abstractWith the rapid development of information technology and the growing number of network attacks, ensuring the security of computer networks is particularly important. One of the covert methods of data transmission is network steganography, which allows information to be embedded in legitimate network traffic. Such approaches are used by attackers to control malware, establish covert communication channels, and leak confidential data. This paper examines the main attack methods based on network steganography and analyzes modern approaches to their detection.en_US
dc.language.isoenen_US
dc.publisherБГУИРen_US
dc.subjectматериалы конференцийen_US
dc.subjectnetwork steganographyen_US
dc.subjectcovert channel detectionen_US
dc.subjectsteganalysisen_US
dc.subjectinformation hidingen_US
dc.subjectmachine learningen_US
dc.subjectdeep learningen_US
dc.subjectmultilayer hybrid detectionen_US
dc.subjectZero Trusten_US
dc.titleDetecting cyber-attacks based on network steganographyen_US
dc.typeArticleen_US
Appears in Collections:ТСЗИ 2026

Files in This Item:
File Description SizeFormat 
Duong_Ngoc_Anh_Detecting.pdf490.83 kBAdobe PDFView/Open
Show simple item record Google Scholar

Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.