Research on Covert Transformation Method for Malicious Communication Behavior Based on Packet Length Sequence
YANG Judong, CHEN Xingshu, ZHU Yi
Netinfo Security . 2025, (5): 794 -805 .  DOI: 10.3969/j.issn.1671-1122.2025.05.011