Author of the publication

Inter-Protocol Steganography for Real-Time Services and Its Detection Using Traffic Coloring Approach.

, , , and . LCN, page 78-85. IEEE Computer Society, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Detecting protocol switching covert channels., and . LCN, page 280-283. IEEE Computer Society, (2012)Dynamic routing in covert channel overlays based on control protocols., , and . ICITST, page 32-39. IEEE, (2012)Hiding Privacy Leaks in Android Applications Using Low-Attention Raising Covert Channels., and . ARES, page 701-710. IEEE Computer Society, (2013)Micro protocol engineering for unstructured carriers: On the embedding of steganographic control protocols into audio transmissions., , , and . CoRR, (2015)Micro protocol engineering for unstructured carriers: on the embedding of steganographic control protocols into audio transmissions., , , and . Security and Communication Networks, 9 (15): 2972-2985 (2016)Analysis of Human Awareness of Security and Privacy Threats in Smart Environments., , , and . HCI (22), volume 9190 of Lecture Notes in Computer Science, page 165-177. Springer, (2015)Why Johnny Can't Use Stego: a Human-oriented Perspective on the Application of Steganography.. CoRR, (2016)Systematic Engineering of Control Protocols for Covert Channels., and . Communications and Multimedia Security, volume 7394 of Lecture Notes in Computer Science, page 131-144. Springer, (2012)Towards Suppressing Attacks on and Improving Resilience of Building Automation Systems - an Approach Exemplified Using BACnet., , , , and . Sicherheit, volume P-228 of LNI, page 407-418. GI, (2014)Security, Privacy and Reliability of Smart Buildings., and . J. UCS, 22 (9): 1201-1202 (2016)