Indian Journal of Science and Technology
Year: 2015, Volume: 8, Issue: 26, Pages: 1-9
Byungho Park1* , Dukyun Kim1 and Daecheol Shin2
1 Ministry of National Defense, Seoul 140 – 701, Korea; [email protected]
2 Korea e-Government Exp Associations, Seoul 121 – 915, Korea
Keywords: Closed Network, Image Hacking, Malicious Code, Steganography, Stegosploit
Subscribe now for latest articles and news.