A stealthy covert storage channel for asymmetric surveillance VoLTE endpoints
暂无分享,去创建一个
Jingjing Hu | Xiaosong Zhang | Yuan Xue | Quanxin Zhang | Jingjing Hu | Quan-xin Zhang | Xiaosong Zhang | Yuan Xue
[1] B. B. Gupta,et al. Secure and imperceptible digital image steganographic algorithm based on diamond encoding in DWT domain , 2017, Multimedia Tools and Applications.
[2] Alessandro Andreadis,et al. A cross-layer jitter-based TCP for wireless networks , 2016, EURASIP J. Wirel. Commun. Netw..
[3] Mohsen Guizani,et al. Transactions papers a routing-driven Elliptic Curve Cryptography based key management scheme for Heterogeneous Sensor Networks , 2009, IEEE Transactions on Wireless Communications.
[4] Mahmoud Al-Ayyoub,et al. Improving the performance of the needleman-wunsch algorithm using parallelization and vectorization techniques , 2017, Multimedia Tools and Applications.
[5] Chung G. Kang,et al. LTE Network Emulator for VoLTE Service , 2014 .
[6] Feiping Nie,et al. Compound Rank- $k$ Projections for Bilinear Analysis , 2014, IEEE Transactions on Neural Networks and Learning Systems.
[7] Yu-Hui Wang,et al. Applying Patent-Based Fuzzy Quality Function Deployment to Explore Prospective VoLTE Technologies , 2016, Int. J. Fuzzy Syst..
[8] Marcin Szpyrka. FAST AND FLEXIBLE MODELLING OF REAL-TIME SYSTEMS WITH RTCP-NETS , 2004 .
[9] Javier López,et al. HIDE_DHCP: Covert Communications through Network Configuration Messages , 2012, SEC.
[10] Yong Gan,et al. A Self-certified Cross-Cluster Asymmetric Group Key Agreement for Wireless Sensor Networks , 2019 .
[11] Jean Meloche,et al. Statistical Aspects of the Analysis of Data Networks , 2007, Technometrics.
[12] Xiaohui Kuang,et al. Boosting Targeted Black-Box Attacks via Ensemble Substitute Training and Linear Augmentation , 2019, Applied Sciences.
[13] Wojciech Mazurczyk,et al. Retransmission steganography and its detection , 2011, Soft Comput..
[14] Xiaojun Chang,et al. Semisupervised Feature Analysis by Mining Correlations Among Multiple Tasks , 2014, IEEE Transactions on Neural Networks and Learning Systems.
[15] Liehuang Zhu,et al. A round-optimal lattice-based blind signature scheme for cloud services , 2017, Future Gener. Comput. Syst..
[16] Longfei Wu,et al. EFFECT: an efficient flexible privacy-preserving data aggregation scheme with authentication in smart grid , 2019, Science China Information Sciences.
[17] Jin Li,et al. Flexible neural trees based early stage identification for IP traffic , 2017, Soft Comput..
[18] Ghizlane Orhanou,et al. Secure Mobile Multi Cloud Architecture for Authentication and Data Storage , 2017, Int. J. Cloud Appl. Comput..
[19] Xiaojiang Du,et al. Privacy-Preserving and Efficient Aggregation Based on Blockchain for Power Grid Communications in Smart Communities , 2018, IEEE Communications Magazine.
[20] Vijay Varadharajan,et al. The Silence of the LANs: Efficient Leakage Resilience for IPsec VPNs , 2014, IEEE Trans. Inf. Forensics Secur..
[21] Yuanzhang Li,et al. A High-Imperceptibility and Histogram-Shifting Data Hiding Scheme for JPEG Images , 2019, IEEE Access.
[22] Javier López,et al. Covert communications through network configuration messages , 2013, Comput. Secur..
[23] Chen Liang,et al. A root privilege management scheme with revocable authorization for Android devices , 2018, J. Netw. Comput. Appl..
[24] Zouhair Guennoun,et al. Towards successful VoLTE and VoWiFi deployment: network function virtualization solutions’ benefits and challenges , 2017, Telecommun. Syst..
[25] Henning Schulzrinne,et al. RTP: A Transport Protocol for Real-Time Applications , 1996, RFC.
[26] Georg Carle,et al. Survey of error recovery techniques for IP-based audio-visual multicast applications , 1997, IEEE Netw..
[27] Chen Liang,et al. RootAgency: A digital signature-based root privilege management agency for cloud terminal devices , 2018, Inf. Sci..
[28] N. deSouza,et al. Investigation of metabolite changes in the transition from pre‐invasive to invasive cervical cancer measured using 1H and 31P magic angle spinning MRS of intact tissue , 2009, NMR in biomedicine.
[29] Xiaojiang Du,et al. Security in wireless sensor networks , 2008, IEEE Wireless Communications.
[30] Chen Liang,et al. A sensitive network jitter measurement for covert timing channels over interactive traffic , 2018, Multimedia Tools and Applications.
[31] Xiaojiang Du,et al. A survey of key management schemes in wireless sensor networks , 2007, Comput. Commun..
[32] Butler W. Lampson,et al. A note on the confinement problem , 1973, CACM.
[33] Yi Yang,et al. Bi-Level Semantic Representation Analysis for Multimedia Event Detection , 2017, IEEE Transactions on Cybernetics.
[34] Jacob Philip,et al. Composition dependence of optical band gap and thermal diffusivity of AsTeSe glasses , 1992 .
[35] Kwang-deok Seo,et al. A client-driven media synchronization mechanism for RTP packet-based video streaming , 2015, Journal of Real-Time Image Processing.
[36] Jin Li,et al. Insight of the protection for data security under selective opening attacks , 2017, Inf. Sci..
[37] Kejie Lu,et al. Construction and Mitigation of User-Behavior-Based Covert Channels on Smartphones , 2018, IEEE Transactions on Mobile Computing.