Cryptography and steganography: teaching experience
Enhanced methods in computer security, biometric and artificial intelligence systems
A novel covert channel based on the IP header record route option
International Journal of Advanced Media and Communication
Exploiting error control in network traffic for robust, high rate covert channels
International Journal of Electronic Security and Digital Forensics
Nostega: A Novel Noiseless Steganography Paradigm
Journal of Digital Forensic Practice
TrustMAS: Trusted Communication Platform for Multi-Agent Systems
OTM '08 Proceedings of the OTM 2008 Confederated International Conferences, CoopIS, DOA, GADA, IS, and ODBASE 2008. Part II on On the Move to Meaningful Internet Systems
ACM Transactions on Information and System Security (TISSEC)
A framework for synthetic stego
Proceedings of the 5th Annual Workshop on Cyber Security and Information Intelligence Research: Cyber Security and Information Intelligence Challenges and Strategies
Esense: communication through energy sensing
Proceedings of the 15th annual international conference on Mobile computing and networking
Covert channels in ad-hoc wireless networks
Ad Hoc Networks
GIIS'09 Proceedings of the Second international conference on Global Information Infrastructure Symposium
Analyzing network-aware active wardens in IPv6
IH'06 Proceedings of the 8th international conference on Information hiding
Load-based covert channels between Xen virtual machines
Proceedings of the 2010 ACM Symposium on Applied Computing
Embedding a covert channel in active network connections
GLOBECOM'09 Proceedings of the 28th IEEE conference on Global telecommunications
Hide and seek in time: robust covert timing channels
ESORICS'09 Proceedings of the 14th European conference on Research in computer security
CLACK: a network covert channel based on partial acknowledgment encoding
ICC'09 Proceedings of the 2009 IEEE international conference on Communications
Comprehensive linguistic steganography survey
International Journal of Information and Computer Security
Headstega: e-mail-headers-based steganography methodology
International Journal of Electronic Security and Digital Forensics
Summary-invisible networking: techniques and defenses
ISC'10 Proceedings of the 13th international conference on Information security
Sumstega: summarisation-based steganography methodology
International Journal of Information and Computer Security
CoCo: coding-based covert timing channels for network flows
IH'11 Proceedings of the 13th international conference on Information hiding
Cirripede: circumvention infrastructure using router redirection with plausible deniability
Proceedings of the 18th ACM conference on Computer and communications security
Edustega: an Education-Centric Steganography methodology
International Journal of Security and Networks
Syntax and semantics-preserving application-layer protocol steganography
IH'04 Proceedings of the 6th international conference on Information Hiding
An asynchronous covert channel using spam
Computers & Mathematics with Applications
Embedding covert channels into TCP/IP
IH'05 Proceedings of the 7th international conference on Information Hiding
Traceroute based IP channel for sending hidden short messages
IWSEC'06 Proceedings of the 1st international conference on Security
Network covert channels on the Android platform
Proceedings of the Seventh Annual Workshop on Cyber Security and Information Intelligence Research
PET'05 Proceedings of the 5th international conference on Privacy Enhancing Technologies
CSP-Based general detection model of network covert storage channels
ICT-EurAsia'13 Proceedings of the 2013 international conference on Information and Communication Technology
An Application Based on Steganography
ASONAM '12 Proceedings of the 2012 International Conference on Advances in Social Networks Analysis and Mining (ASONAM 2012)
Hi-index | 0.00 |