A Mileva, B Panajotov - Open Computer Science, 2014 - degruyter.com
Covert channels in TCP/IP protocol stack - extended version- Skip to content Should you have institutional access? Here's how to get it ... De Gruyter € EUR - Euro £ GBP - Pound $ USD …
Until now hiding methods in network steganography have been described in arbitrary ways, making them difficult to compare. For instance, some publications describe classical channel …
L Zhang, T Huang, X Hu, Z Zhang… - … Materials & Continua, 2020 - cdn.techscience.cn
Covert channel of the packet ordering is a hot research topic. Encryption technology is not enough to protect the security of both sides of communication. Covert channel needs to hide …
A unified understanding of terms and their applicability is essential for every scientific discipline: steganography is no exception. Being divided into several domains (for instance …
Network steganography encompasses the information hiding techniques that can be applied in communication network environments and that utilize hidden data carriers for this …
L Zhang, T Huang, W Rasheed, X Hu, C Zhao - IEEE Access, 2019 - ieeexplore.ieee.org
The construction method of the covert channel has always been a topic of research and exploration in the field of information security, and the use of IP data packets for covert …
Q Zhang, X Zhang, Y Xue, J Hu - Future Generation Computer Systems, 2020 - Elsevier
The widely adaptation of shared or public cloud computing raises an amount of concerns about privacy and information security. Establishing a covert channel is a feasible solution to …
P Xue, H Liu, J Hu, R Hu - AIP Conference Proceedings, 2018 - pubs.aip.org
Both audio steganography and network steganography are belong to modern steganography. Audio steganography has a large capacity. Network steganography is …