{"version.version":"0.0.7","version.cm_url":"https://github.com/ceurws/ceur-spt","spt.html_url":"/Vol-3963/paper27.html","spt.description":null,"spt.id":"Vol-3963/paper27","spt.wikidataid":null,"spt.title":"Method for detecting malicious commands transmitted via images\n              using steganography","spt.pdfUrl":"https://ceur-ws.org/Vol-3963/paper27.pdf","spt.volume":{"number":3963,"acronym":"IntelITSIS 2025","wikidataid":null,"title":"Proceedings of the The 6th International Workshop on Intelligent Information Technologies & Systems of Information Security (IntelITSIS 2025)","description":null,"url":null,"date":"2025-05-15","dblp":null,"k10plus":null,"urn":null},"spt.session":null,"cvb.id":"Vol-3963/paper27","cvb.title":"Method for detecting malicious commands transmitted via images\n              using steganography","cvb.type":null,"cvb.position":null,"cvb.pagesFrom":null,"cvb.pagesTo":null,"cvb.authors":"Dmytro Denysiuk,Oleg Savenko,Miroslav Kvassay","cvb.vol_number":"3963","cvb.pdf_name":"paper27.pdf","cvb.pages":"340-350","cvb.fail":null}