A Wireless Covert Channel Based on Constellation Shaping Modulation
暂无分享,去创建一个
Weiwei Liu | Yuewei Dai | Guangjie Liu | Jiangtao Zhai | Pengcheng Cao | Xiaopeng Ji | Weiwei Liu | Yue-wei Dai | Xiaopeng Ji | Jiangtao Zhai | Guangjie Liu | Pengcheng Cao
[1] Yuewei Dai,et al. Network covert timing channel with distribution matching , 2012, Telecommun. Syst..
[2] Carla E. Brodley,et al. IP covert timing channels: design and detection , 2004, CCS '04.
[3] Hisato Iwai,et al. Wireless steganography using MIMO system , 2014, 2014 IEEE Fifth International Conference on Communications and Electronics (ICCE).
[4] Limin Sun,et al. CovertMIMO: A covert uplink transmission scheme for MIMO systems , 2017, 2017 IEEE International Conference on Communications (ICC).
[5] Peng Ning,et al. On the secrecy of timing-based active watermarking trace-back techniques , 2006, 2006 IEEE Symposium on Security and Privacy (S&P'06).
[6] Dirk Grunwald,et al. Secret Agent Radio: Covert Communication through Dirty Constellations , 2012, Information Hiding.
[7] Sushil Jajodia,et al. Model-Based Covert Timing Channels: Automated Modeling and Evasion , 2008, RAID.
[8] Matthew K. Wright,et al. Liquid: A detection-resistant covert timing channel based on IPD shaping , 2011, Comput. Networks.
[9] Eldad Perahia,et al. Next Generation Wireless LANs: Preface , 2008 .
[10] Feng Shu,et al. Covert Communication in Wireless Relay Networks , 2017, GLOBECOM 2017 - 2017 IEEE Global Communications Conference.
[11] Matthew K. Wright,et al. Mimic: An active covert channel that evades regularity-based detection , 2013, Comput. Networks.
[12] Steffen Wendzel,et al. "The Good, The Bad And The Ugly": Evaluation of Wi-Fi Steganography , 2015, J. Commun..
[13] Iwona Grabska,et al. Steganography in Long Term Evolution Systems , 2014, 2014 IEEE Security and Privacy Workshops.
[14] Matthias Hollick,et al. Practical covert channels for WiFi systems , 2015, 2015 IEEE Conference on Communications and Network Security (CNS).
[15] Aleksandra Mileva,et al. Covert channels in TCP/IP protocol stack - extended version- , 2014, Central European Journal of Computer Science.
[16] Steven Gianvecchio,et al. An Entropy-Based Approach to Detecting Covert Timing Channels , 2011, IEEE Transactions on Dependable and Secure Computing.
[17] Wojciech Mazurczyk,et al. Hiding Data in OFDM Symbols of IEEE 802.11 Networks , 2010, 2010 International Conference on Multimedia Information Networking and Security.
[18] Victor S. Frost,et al. Exploiting OFDM systems for covert communication , 2010, 2010 - MILCOM 2010 MILITARY COMMUNICATIONS CONFERENCE.
[19] Jun Li,et al. Covert Communication Achieved by a Greedy Relay in Wireless Networks , 2017, IEEE Transactions on Wireless Communications.