Found: 44
Select item for more details and to access through your institution.
YouSkyde: information hiding for Skype video traffic.
- Published in:
- Multimedia Tools & Applications, 2016, v. 75, n. 21, p. 13521, doi. 10.1007/s11042-015-2740-0
- By:
- Publication type:
- Article
Using transcoding for hidden communication in IP telephony.
- Published in:
- Multimedia Tools & Applications, 2014, v. 70, n. 3, p. 2139, doi. 10.1007/s11042-012-1224-8
- By:
- Publication type:
- Article
What are suspicious VoIP delays?
- Published in:
- Multimedia Tools & Applications, 2012, v. 57, n. 1, p. 109, doi. 10.1007/s11042-010-0532-0
- By:
- Publication type:
- Article
Cyber(in)security.
- Published in:
- International Journal of Electronics & Telecommunications, 2020, v. 66, n. 1, p. 243, doi. 10.24425/ijet.2020.131870
- By:
- Publication type:
- Article
Yet Another Pseudorandom Number Generator.
- Published in:
- International Journal of Electronics & Telecommunications, 2017, v. 63, n. 2, p. 195, doi. 10.1515/eletel-2017-0026
- By:
- Publication type:
- Article
MoveSteg: A Method of Network Steganography Detection.
- Published in:
- International Journal of Electronics & Telecommunications, 2016, v. 62, n. 4, p. 335, doi. 10.1515/eletel-2016-0046
- By:
- Publication type:
- Article
Network Steganography in the DNS Protocol.
- Published in:
- International Journal of Electronics & Telecommunications, 2016, v. 62, n. 4, p. 343, doi. 10.1515/eletel-2016-0047
- By:
- Publication type:
- Article
StegHash: New Method for Information Hiding in Open Social Networks.
- Published in:
- International Journal of Electronics & Telecommunications, 2016, v. 62, n. 4, p. 347, doi. 10.1515/eletel-2016-0048
- By:
- Publication type:
- Article
Steganography Training: a Case Study from University of Shumen in Bulgaria.
- Published in:
- International Journal of Electronics & Telecommunications, 2016, v. 62, n. 3, p. 315, doi. 10.1515/eletel-2016-0043
- By:
- Publication type:
- Article
Influence of speech codecs selection on transcoding steganography.
- Published in:
- Telecommunication Systems, 2015, v. 59, n. 3, p. 305, doi. 10.1007/s11235-014-9937-9
- By:
- Publication type:
- Article
Networks for the e-society.
- Published in:
- Telecommunication Systems, 2013, v. 52, n. 2, p. 931, doi. 10.1007/s11235-011-9601-6
- By:
- Publication type:
- Article
On information hiding in retransmissions.
- Published in:
- Telecommunication Systems, 2013, v. 52, n. 2, p. 1113, doi. 10.1007/s11235-011-9617-y
- By:
- Publication type:
- Article
PadSteg: introducing inter-protocol steganography.
- Published in:
- Telecommunication Systems, 2013, v. 52, n. 2, p. 1101, doi. 10.1007/s11235-011-9616-z
- By:
- Publication type:
- Article
Evaluation of steganographic methods for oversized IP packets.
- Published in:
- Telecommunication Systems, 2012, v. 49, n. 2, p. 207, doi. 10.1007/s11235-010-9362-7
- By:
- Publication type:
- Article
A performance analysis of HICCUPS-a steganographic system for WLAN.
- Published in:
- Telecommunication Systems, 2012, v. 49, n. 2, p. 255, doi. 10.1007/s11235-010-9363-6
- By:
- Publication type:
- Article
Toward network steganography detection.
- Published in:
- Telecommunication Systems, 2012, v. 49, n. 2, p. 161, doi. 10.1007/s11235-010-9361-8
- By:
- Publication type:
- Article
Guest editorial.
- Published in:
- Telecommunication Systems, 2010, v. 45, n. 2/3, p. 93, doi. 10.1007/s11235-009-9238-x
- By:
- Publication type:
- Article
Saturation throughput analysis of IEEE 802.11g (ERP-OFDM) networks.
- Published in:
- Telecommunication Systems, 2008, v. 38, n. 1/2, p. 45
- By:
- Publication type:
- Article
Retransmission steganography and its detection.
- Published in:
- Soft Computing - A Fusion of Foundations, Methodologies & Applications, 2011, v. 15, n. 3, p. 505, doi. 10.1007/s00500-009-0530-1
- By:
- Publication type:
- Article
Security Analysis of Low-Budget IoT Smart Home Appliances Embedded Software and Connectivity.
- Published in:
- Electronics (2079-9292), 2024, v. 13, n. 12, p. 2371, doi. 10.3390/electronics13122371
- By:
- Publication type:
- Article
Cybersecurity and Data Science.
- Published in:
- Electronics (2079-9292), 2022, v. 11, n. 15, p. 2309, doi. 10.3390/electronics11152309
- By:
- Publication type:
- Article
Detection of Image Steganography Using Deep Learning and Ensemble Classifiers.
- Published in:
- Electronics (2079-9292), 2022, v. 11, n. 10, p. N.PAG, doi. 10.3390/electronics11101565
- By:
- Publication type:
- Article
Dataset Generation for Development of Multi-Node Cyber Threat Detection Systems.
- Published in:
- Electronics (2079-9292), 2021, v. 10, n. 21, p. 2711, doi. 10.3390/electronics10212711
- By:
- Publication type:
- Article
Discussion on IoT Security Recommendations against the State-of-the-Art Solutions.
- Published in:
- Electronics (2079-9292), 2021, v. 10, n. 15, p. 1814, doi. 10.3390/electronics10151814
- By:
- Publication type:
- Article
PF-TL: Payload Feature-Based Transfer Learning for Dealing with the Lack of Training Data.
- Published in:
- Electronics (2079-9292), 2021, v. 10, n. 10, p. 1148, doi. 10.3390/electronics10101148
- By:
- Publication type:
- Article
Correspondence Learning for Deep Multi-Modal Recognition and Fraud Detection †.
- Published in:
- Electronics (2079-9292), 2021, v. 10, n. 7, p. 800, doi. 10.3390/electronics10070800
- By:
- Publication type:
- Article
Multi-Language Spam/Phishing Classification by Email Body Text: Toward Automated Security Incident Investigation.
- Published in:
- Electronics (2079-9292), 2021, v. 10, n. 6, p. 668, doi. 10.3390/electronics10060668
- By:
- Publication type:
- Article
Multilayer Detection of Network Steganography.
- Published in:
- Electronics (2079-9292), 2020, v. 9, n. 12, p. 2128, doi. 10.3390/electronics9122128
- By:
- Publication type:
- Article
Big Data Analytics for Information Security.
- Published in:
- Security & Communication Networks, 2018, p. 1, doi. 10.1155/2018/7657891
- By:
- Publication type:
- Article
Perfect undetectability of network steganography.
- Published in:
- Security & Communication Networks, 2016, v. 9, n. 15, p. 2998, doi. 10.1002/sec.1491
- By:
- Publication type:
- Article
Cyber Crime.
- Published in:
- 2016
- By:
- Publication type:
- Editorial
On importance of steganographic cost for network steganography.
- Published in:
- Security & Communication Networks, 2016, v. 9, n. 8, p. 781, doi. 10.1002/sec.1085
- By:
- Publication type:
- Article
Trends in modern information hiding: techniques, applications, and detection.
- Published in:
- Security & Communication Networks, 2016, v. 9, n. 8, p. 703, doi. 10.1002/sec.1469
- By:
- Publication type:
- Article
Steganography in IEEE 802.11 OFDM symbols.
- Published in:
- Security & Communication Networks, 2016, v. 9, n. 2, p. 118, doi. 10.1002/sec.306
- By:
- Publication type:
- Article
On the undetectability of transcoding steganography.
- Published in:
- Security & Communication Networks, 2015, v. 8, n. 18, p. 3804, doi. 10.1002/sec.1301
- By:
- Publication type:
- Article
On steganography in lost audio packets.
- Published in:
- Security & Communication Networks, 2014, v. 7, n. 12, p. 2602, doi. 10.1002/sec.388
- By:
- Publication type:
- Article
Trends in modern information hiding: techniques, applications and detection.
- Published in:
- Security & Communication Networks, 2013, v. 6, n. 11, p. 1414, doi. 10.1002/sec.919
- By:
- Publication type:
- Article
Security and privacy issues for the network of the future.
- Published in:
- Security & Communication Networks, 2012, v. 5, n. 9, p. 987, doi. 10.1002/sec.384
- By:
- Publication type:
- Article
Advances in digital media security and right management.
- Published in:
- 2014
- By:
- Publication type:
- Editorial
UAV Support for Mission Critical Services.
- Published in:
- Energies (19961073), 2022, v. 15, n. 15, p. 5681, doi. 10.3390/en15155681
- By:
- Publication type:
- Article
Anomaly Detection in Cyclic Communication in OT Protocols.
- Published in:
- Energies (19961073), 2022, v. 15, n. 4, p. 1517, doi. 10.3390/en15041517
- By:
- Publication type:
- Article
Evaluation of Efficiency of Transcoding Steganography.
- Published in:
- Journal of Homeland Security & Emergency Management, 2014, v. 11, n. 4, p. 555, doi. 10.1515/jhsem-2014-0028
- By:
- Publication type:
- Article
Machine Learning Algorithms for Identifying Dependencies in OT Protocols.
- Published in:
- Energies (19961073), 2023, v. 16, n. 10, p. 4056, doi. 10.3390/en16104056
- By:
- Publication type:
- Article
Toward Effective and Reliable Digital Forensics.
- Published in:
- Computer Journal, 2012, v. 55, n. 6, p. 651, doi. 10.1093/comjnl/bxs012
- By:
- Publication type:
- Article