A Revised Taxonomy of Steganography Embedding Patterns
暂无分享,去创建一个
L. Caviglione | W. Mazurczyk | J. Keller | C. Vielhauer | J. Dittmann | S. Wendzel | Laura Hartmann | A. Mileva | T. Neubert | Christian Krätzer | Kevin Lamshöft
[1] Wojciech Mazurczyk,et al. Comprehensive analysis of MQTT 5.0 susceptibility to network covert channels , 2021, Comput. Secur..
[2] Gabriele Tolomei,et al. Turning Federated Learning Systems Into Covert Channels , 2021, IEEE Access.
[3] Luca Caviglione,et al. Trends and Challenges in Network Covert Channels Countermeasures , 2021, Applied Sciences.
[4] David Hutchison,et al. Internet Evolution: Critical Issues , 2020, IEEE Internet Computing.
[5] Richie Bonett,et al. The Top 10 Risks of Machine Learning Security , 2020, Computer.
[6] W. Mazurczyk,et al. Introducing Dead Drops to Network Steganography using ARP-Caches and SNMP-Walks , 2019, ARES.
[7] Wojciech Mazurczyk,et al. Countering adaptive network covert communication with dynamic wardens , 2019, Future Gener. Comput. Syst..
[8] Ahmed Raza Rajput,et al. Modern Text Hiding, Text Steganalysis, and Applications: A Comparative Analysis , 2019, Entropy.
[9] Otto-von,et al. THREAT ANALYSIS OF STEGANOGRAPHIC AND COVERT COMMUNICATION IN NUCLEAR I&C SYSTEMS , 2019 .
[10] Christian Steger,et al. Sensing Danger: Exploiting Sensors to Build Covert Channels , 2019, ICISSP.
[11] Wojciech Mazurczyk,et al. Towards Deriving Insights into Data Hiding Methods Using Pattern-based Approach , 2018, ARES.
[12] Martin Steinebach,et al. Channel Steganalysis , 2018, ARES.
[13] Ramesh Karri,et al. Process-Aware Covert Channels Using Physical Instrumentation in Cyber-Physical Systems , 2018, IEEE Transactions on Information Forensics and Security.
[14] Wojciech Mazurczyk,et al. Don’t You Touch My Nuts: Information Hiding in Cyber Physical Systems , 2017, 2017 IEEE Security and Privacy Workshops (SPW).
[15] Steffen Wendzel,et al. Creativity in Mind: Evaluating and Maintaining Advances in Network Steganographic Research , 2015, J. Univers. Comput. Sci..
[16] Wojciech Mazurczyk,et al. Steganography in Modern Smartphones and Mitigation Techniques , 2014, IEEE Communications Surveys & Tutorials.
[17] Sebastian Zander,et al. Pattern-Based Survey and Categorization of Network Covert Channel Techniques , 2014, ACM Comput. Surv..
[18] Steffen Wendzel,et al. Systematic Engineering of Control Protocols for Covert Channels , 2012, Communications and Multimedia Security.
[19] Wojciech Mazurczyk,et al. Using transcoding for hidden communication in IP telephony , 2011, Multimedia Tools and Applications.
[20] Fauzan Mirza,et al. Designing a cluster-based covert channel to evade disk investigation and forensics , 2011, Comput. Secur..
[21] Chuan Ma,et al. Covert channel for local area network , 2010, 2010 IEEE International Conference on Wireless Communications, Networking and Information Security.
[22] Wojciech Mazurczyk,et al. LACK—a VoIP steganographic method , 2008, Telecommun. Syst..
[23] Jessica Fridrich,et al. Steganography in Digital Media: References , 2009 .
[24] Sebastian Zander,et al. Covert channels in multiplayer first person shooter online games , 2008, 2008 33rd IEEE Conference on Local Computer Networks (LCN).
[25] Sebastian Zander,et al. A survey of covert channels and countermeasures in computer network protocols , 2007, IEEE Communications Surveys & Tutorials.
[26] Grzegorz Lewandowski,et al. Covert Channels in IPv6 , 2005, Privacy Enhancing Technologies.
[27] Marko Jahnke,et al. Data Hiding in Journaling File Systems , 2005, DFRWS.
[28] Markus G. Kuhn,et al. Information hiding-a survey , 1999, Proc. IEEE.
[29] J. van Leeuwen,et al. Information Hiding , 1999, Lecture Notes in Computer Science.
[30] Theodore G. Handel,et al. Hiding Data in the OSI Network Model , 1996, Information Hiding.
[31] Ross Anderson,et al. Information hiding terminology , 1996 .
[32] Walter Bender,et al. Techniques for data hiding , 1995, Electronic Imaging.