[1]
D. Fokin and M. Yevdokymenko, “Analysis of protocol steganography methods in software-defined networks”, RT, no. 222, pp. 172–183, Sep. 2025.