has been cited by the following article(s):
[1]
|
Detecting Malicious Devices in IPSEC Traffic with IPv4 Steganography
|
|
Applied Sciences,
2024 |
|
|
[2]
|
A Walk-through towards Network Steganography Techniques
|
|
Информатика и …,
2023 |
|
|
[3]
|
Information Hiding Using Minification
|
|
2021 |
|
|
[4]
|
Steganografijos metodas RTP protokole
|
|
2021 |
|
|
[5]
|
Exploiting minification for data hiding purposes
|
|
2020 |
|
|
[6]
|
IT Security Managers' Strategies for Mitigating Data Breaches in Texas School Districts
|
|
2020 |
|
|
[7]
|
Efficient distributed network covert channels for Internet of things environments
|
|
2020 |
|
|
[8]
|
Digital Watermarking of video streams: Review of the State-Of-The-Art
|
|
2019 |
|
|
[9]
|
Steganografijos metodas, naudojant HTTP/2 protokolą
|
|
Thesis,
2019 |
|
|
[10]
|
Efficient Non-Linear Covert Channel Detection in TCP Data Streams
|
|
2019 |
|
|
[11]
|
A review of various steganography techniques in cloud computing
|
|
University of Thi-Qar Journal of Science,
2019 |
|
|
[12]
|
SOMSteg-Framework for Covert Channel, and its Detection, within HTTP.
|
|
J. Univers. Comput. Sci.,
2018 |
|
|
[13]
|
SOMSteg-Framework for Covert Channel, and its Detection, within HTTP
|
|
2018 |
|
|
[14]
|
Um dataset de ataques Low Rate DDoS
|
|
REVISTA MILITAR DE CIêNCIA E TECNOLOGIA,
2018 |
|
|
[15]
|
MODELAGEM NUMéRICA PARA PAVIMENTA??O FLEXíVEL PELO MéTODO DOS ELEMENTOS FINITOS
|
|
2008 |
|
|
[16]
|
MINISTÉRIO DA DEFESA EXÉRCITO BRASILEIRO DEPARTAMENTO DE CIÊNCIA E TECNOLOGIA INSTITUTO MILITAR DE ENGENHARIA CURSO DE …
|
|
|
|
|
[1]
|
The Obfuscated Network Steganography
IEEE Access,
2025
DOI:10.1109/ACCESS.2025.3538633
|
|
|
[2]
|
Detecting Malicious Devices in IPSEC Traffic with IPv4 Steganography
Applied Sciences,
2024
DOI:10.3390/app14093934
|
|
|
[3]
|
A Walk-through towards Network Steganography Techniques
Informatics and Automation,
2023
DOI:10.15622/ia.22.5.6
|
|
|
[4]
|
Information Hiding Using Minification
IEEE Access,
2021
DOI:10.1109/ACCESS.2021.3077197
|
|
|
[5]
|
Exploiting minification for data hiding purposes
Proceedings of the 15th International Conference on Availability, Reliability and Security,
2020
DOI:10.1145/3407023.3409209
|
|
|
[6]
|
Exploiting minification for data hiding purposes
Proceedings of the 15th International Conference on Availability, Reliability and Security,
2020
DOI:10.1145/3407023.3409209
|
|
|
[7]
|
Efficient Non-Linear Covert Channel Detection in TCP Data Streams
IEEE Access,
2020
DOI:10.1109/ACCESS.2019.2961609
|
|
|