Sengupta,A. (2019). XXXXXXXX detective control using hardware steganography for IP XXXX XXXXXXXXXX. Frontiers in Securing IP XXXXX: XXXXXXXX detective control XXX XXXXXXXXXXX techniques, XX-65. https://XXX.org/10.XXXX/XXXXXXXXXXXX