OTM '08 Proceedings of the OTM 2008 Confederated International Conferences, CoopIS, DOA, GADA, IS, and ODBASE 2008. Part II on On the Move to Meaningful Internet Systems
Robust and undetectable steganographic timing channels for i.i.d. traffic
IH'10 Proceedings of the 12th international conference on Information hiding
Stealthier inter-packet timing covert channels
NETWORKING'11 Proceedings of the 10th international IFIP TC 6 conference on Networking - Volume Part I
Evaluating the transmission rate of covert timing channels in a network
Computer Networks: The International Journal of Computer and Telecommunications Networking
Adaptive partial-matching steganography for voice over IP using triple M sequences
Computer Communications
Proceedings of the 4th international conference on Security of information and networks
A framework for avoiding steganography usage over HTTP
Journal of Network and Computer Applications
Hiding information in a Stream Control Transmission Protocol
Computer Communications
Network covert channels on the Android platform
Proceedings of the Seventh Annual Workshop on Cyber Security and Information Intelligence Research
Sherlock Holmes and the case of the advanced persistent threat
LEET'12 Proceedings of the 5th USENIX conference on Large-Scale Exploits and Emergent Threats
Steganography in streaming multimedia over networks
Transactions on Data Hiding and Multimedia Security VII
Secret agent radio: covert communication through dirty constellations
IH'12 Proceedings of the 14th international conference on Information Hiding
CSP-Based general detection model of network covert storage channels
ICT-EurAsia'13 Proceedings of the 2013 international conference on Information and Communication Technology
SoNIC: precise realtime software access and control of wired networks
nsdi'13 Proceedings of the 10th USENIX conference on Networked Systems Design and Implementation
A realistic implementation for simulating side-channel in mobile ad hoc networks
Proceedings of the Military Modeling & Simulation Symposium
From an IP address to a street address: using wireless signals to locate a target
WOOT'13 Proceedings of the 7th USENIX conference on Offensive Technologies
VoIP steganography and its Detection—A survey
ACM Computing Surveys (CSUR)
PHY covert channels: can you see the idles?
NSDI'14 Proceedings of the 11th USENIX Conference on Networked Systems Design and Implementation
Hi-index | 0.00 |
First Page of the Article