Principles and overview of network steganography
暂无分享,去创建一个
Wojciech Mazurczyk | Krzysztof Szczypiorski | Józef Lubacz | W. Mazurczyk | K. Szczypiorski | J. Lubacz
[1] Nikita Borisov,et al. Stegobot: A Covert Social Network Botnet , 2011, Information Hiding.
[2] Wojciech Mazurczyk,et al. StegTorrent: A Steganographic Method for the P2P File Sharing Service , 2013, 2013 IEEE Security and Privacy Workshops.
[3] Markus G. Kuhn,et al. Information hiding-A survey : Identification and protection of multimedia information , 1999 .
[4] Walter Bender,et al. Techniques for data hiding , 1995, Electronic Imaging.
[5] Birgit Pfitzmann,et al. Information Hiding Terminology - Results of an Informal Plenary Meeting and Additional Proposals , 1996, Information Hiding.
[6] Wojciech Mazurczyk,et al. SkyDe: a Skype-based Steganographic Method , 2013, Int. J. Comput. Commun. Control.
[7] Maarten Van Horenbeeck,et al. Deception on the network: thinking differently about covert channels , 2006 .
[8] Deepa Kundur,et al. Practical Internet Steganography : Data Hiding in IP , 2003 .
[9] Wojciech Mazurczyk,et al. Steganography in IEEE 802.11 OFDM symbols , 2016, Secur. Commun. Networks.
[10] Wojciech Mazurczyk,et al. PadSteg: introducing inter-protocol steganography , 2013, Telecommun. Syst..
[11] Hovav Shacham,et al. Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds , 2009, CCS.
[12] Sebastian Zander,et al. A survey of covert channels and countermeasures in computer network protocols , 2007, IEEE Communications Surveys & Tutorials.
[13] Butler W. Lampson,et al. A note on the confinement problem , 1973, CACM.
[14] Theodore G. Handel,et al. Hiding Data in the OSI Network Model , 1996, Information Hiding.
[15] Wojciech Mazurczyk,et al. Retransmission steganography and its detection , 2011, Soft Comput..
[16] Wojciech Mazurczyk,et al. Covert Channels in SIP for VoIP signalling , 2008, ArXiv.
[17] J. Lubacz,et al. Vice over IP , 2010, IEEE Spectrum.
[18] Donn B. Parker,et al. Toward a New Framework for Information Security , 2015 .