Publication | Closed Access
Information hiding
63
Citations
26
References
2017
Year
Hardware SecurityCybercrimeDigital ObjectsCyber ThievesEngineeringIll-gotten DataInformation SecurityDigital InvestigationData PrivacyInformation ForensicsDigital ForensicsComputer ScienceCyber CrimeCyber Crime InvestigationTechnologyData ManagementData SecurityCryptography
The practice of hiding ill-gotten data in digital objects is rising among cyber thieves. New initiatives serve to educate, train, and thwart these activities.
| Year | Citations | |
|---|---|---|
Page 1
Page 1