Spotting the Adversary with Windows Event Log
Desconocido
Steganography in Commonly Used HF Radio Protocols
Paul Drapeau, Brent Dukes
Wireless and Mobile Hacking and Sniffing Techniques
Dr. Hidaia Mahmood Alassouli