Hoose one of the options in the assignment criteria field

Choose a title from the following list:

a? Side channel attacks
a? Cryptanalysis of the Wired Equivalence Protocol / The Practical attacks
a? Steganography and Steganalysis
a? Public and open source tools versus proprietary closed source tools
a? Malware and forensic investigation.
a? Cannot see the wood for the trees how effective can information hiding be?

Referencing Requirements:
The number of references depends on the writer