Enhanced TCP Sequence Number Steganography using Dynamic Identifier
暂无分享,去创建一个
[1] Prashant R. Deshmukh,et al. Active warden for TCP sequence number base covert channel , 2015, 2015 International Conference on Pervasive Computing (ICPC).
[2] Sathiamoorthy Manoharan,et al. Network steganography and steganalysis - a concise review , 2016, 2016 2nd International Conference on Applied and Theoretical Computing and Communication Technology (iCATccT).
[3] Wojciech Mazurczyk,et al. Information hiding , 2017, Commun. ACM.
[4] Joanna Rutkowska joanna. The Implementation of Passive Covert Channels in the Linux Kernel , 2004 .
[5] Yun Q. Shi,et al. Detecting Covert Channels in Computer Networks Based on Chaos Theory , 2013, IEEE Transactions on Information Forensics and Security.
[6] Galyna Liashenko,et al. Network steganography application for remote biometrie user authentication , 2018, 2018 IEEE 9th International Conference on Dependable Systems, Services and Technologies (DESSERT).
[7] Liusheng Huang,et al. A novel comprehensive steganalysis of transmission control protocol/Internet protocol covert channels based on protocol behaviors and support vector machine , 2015, Secur. Commun. Networks.
[8] Krzysztof Szczypiorski,et al. Steg Blocks: Ensuring Perfect Undetectability of Network Steganography , 2015, 2015 10th International Conference on Availability, Reliability and Security.
[9] Liusheng Huang,et al. Concealed in the Internet: A Novel Covert Channel with Normal Traffic Imitating , 2016, 2016 Intl IEEE Conferences on Ubiquitous Intelligence & Computing, Advanced and Trusted Computing, Scalable Computing and Communications, Cloud and Big Data Computing, Internet of People, and Smart World Congress (UIC/ATC/ScalCom/CBDCom/IoP/SmartWorld).
[10] Craig H. Rowland,et al. Covert Channels in the TCP/IP Protocol Suite , 1997, First Monday.
[11] Aleksandra Mileva,et al. Covert channels in TCP/IP protocol stack - extended version- , 2014, Central European Journal of Computer Science.
[12] Jianhua Yang,et al. Inject Stenography into Cybersecurity Education , 2017, 2017 31st International Conference on Advanced Information Networking and Applications Workshops (WAINA).
[13] Wojciech Mazurczyk,et al. Principles and overview of network steganography , 2012, IEEE Communications Magazine.
[14] Sandip Bobade,et al. Secure Data Communication Using Protocol Steganography in IPv6 , 2015, 2015 International Conference on Computing Communication Control and Automation.
[15] KokSheik Wong,et al. AIPISteg: An active IP identification based steganographic method , 2016, J. Netw. Comput. Appl..
[16] Arun Kumar,et al. Survey on steganography methods (text, image, audio, video, protocol and network steganography) , 2016, 2016 3rd International Conference on Computing for Sustainable Global Development (INDIACom).
[17] K Anjan,et al. Construction of Covert Channel Using Data Hiding Mechanism In Ipv4 , 2015 .
[18] Wojciech Mazurczyk,et al. Towards Utilization of Covert Channels as a Green Networking Technique , 2018, ARES.