A combinatorial approach to network covert communications with applications in Web Leaks | IEEE Conference Publication | IEEE Xplore