A comprehensive survey on robust image watermarking

W Wan, J Wang, Y Zhang, J Li, H Yu, J Sun - Neurocomputing, 2022 - Elsevier
With the rapid development and popularity of the Internet, multimedia security has become a
general essential concern. Especially, as manipulation of digital images gets much easier …

Tight arms race: Overview of current malware threats and trends in their detection

L Caviglione, M Choraś, I Corona, A Janicki… - IEEE …, 2020 - ieeexplore.ieee.org
Cyber attacks are currently blooming, as the attackers reap significant profits from them and
face a limited risk when compared to committing the “classical” crimes. One of the major …

A survey on security and privacy of federated learning

V Mothukuri, RM Parizi, S Pouriyeh, Y Huang… - Future Generation …, 2021 - Elsevier
Federated learning (FL) is a new breed of Artificial Intelligence (AI) that builds upon
decentralized data and training that brings learning to the edge or directly on-device. FL is a …

Trends and challenges in network covert channels countermeasures

L Caviglione - Applied Sciences, 2021 - mdpi.com
Network covert channels are increasingly used to endow malware with stealthy behaviors,
for instance to exfiltrate data or to orchestrate nodes of a botnet in a cloaked manner …

An evaluation framework for industrial control system cyber incidents

MD Firoozjaei, N Mahmoudyar, Y Baseri… - International Journal of …, 2022 - Elsevier
Industrial control systems (ICSs) and critical infrastructure are targeted by sophisticated
cyber incidents launched by skillful and persistent attackers. Due to political, public image …

Detection of image steganography using deep learning and ensemble classifiers

M Płachta, M Krzemień, K Szczypiorski, A Janicki - Electronics, 2022 - mdpi.com
In this article, the problem of detecting JPEG images, which have been steganographically
manipulated, is discussed. The performance of employing various shallow and deep …

Odini: Escaping sensitive data from faraday-caged, air-gapped computers via magnetic fields

M Guri, B Zadov, Y Elovici - IEEE Transactions on Information …, 2019 - ieeexplore.ieee.org
Air-gapped computers are devices that are kept isolated from the Internet, because they
store and process sensitive information. When highly sensitive data is involved, an air …

[HTML][HTML] Comprehensive analysis of MQTT 5.0 susceptibility to network covert channels

A Mileva, A Velinov, L Hartmann, S Wendzel… - Computers & …, 2021 - Elsevier
Abstract Message Queuing Telemetry Transport (MQTT) is a publish-subscribe protocol
which is currently popular in Internet of Things (IoT) applications. Recently its 5.0 version …

[HTML][HTML] Kernel-level tracing for detecting stegomalware and covert channels in Linux environments

L Caviglione, W Mazurczyk, M Repetto… - Computer Networks, 2021 - Elsevier
Modern malware is becoming hard to spot since attackers are increasingly adopting new
techniques to elude signature-and rule-based detection mechanisms. Among the others …

[HTML][HTML] Emerging challenges and perspectives in Deep Learning model security: A brief survey

L Caviglione, C Comito, M Guarascio… - Systems and Soft …, 2023 - Elsevier
The widespread adoption of Artificial Intelligence and Machine Learning tools opens to
security issues that can raise and occur when the underlying ML models integrated into …