A novel method for securing critical infrastructures by detecting hidden flows of data | IEEE Conference Publication | IEEE Xplore