# Graph Nodes ## Description Using graph-based data structures to hide malicious content ## Attack Examples - Encoding messages in node relationships - Using graph traversal patterns to hide data - Storing content in node attributes - Creating steganographic graph layouts - Using edge weights to encode information - Hiding data in graph metadata - Creating special graph patterns - Using subgraph structures to segment content