MA Elsadig - IEEE Access, 2023 - ieeexplore.ieee.org
The characteristics and performance of wireless sensor networks (WSNs) are the main reasons for their rapid expansion in various fields. However, these networks are extremely …
With the rapid advancement of communication and computer network technologies, covert channels are now more secure, quicker to set up, harder to detect, and easier to design than …
Steganography is increasingly exploited by malware to avoid detection and to implement different advanced offensive schemes. An attack paradigm expected to become widely used …
The advanced development of communication technologies has made covert communications quite challenging to be recognized. By altering an entity's timing behavior …
Modern IoT ecosystems are the preferred target of threat actors wanting to incorporate resource-constrained devices within a botnet or leak sensitive information. A major research …
MA Elsadig, A Gafar - … of Electrical & Computer Engineering (2088 …, 2023 - researchgate.net
Covert channel techniques have enriched the way to commit dangerous and unwatched attacks. They exploit ways that are not intended to convey information; therefore, traditional …
NA AL-Khulaidi, AT Zahary… - 2023 3rd International …, 2023 - ieeexplore.ieee.org
The use of covert communications has become more widespread recently as a solution to the information security issue. Information security can be partially solved by the discovery …
Network covert channels are becoming exploited by a wide-range of threats to avoid detection. Such offensive schemes are expected to be also used against IoT deployments …
Steganographic techniques and covert channels are becoming exploited by a wide-range of malware to avoid detection and bypass network security tools. With the ubiquitous diffusion …