Author:
Cho D.X.,Thuong D.T.H.,Dung N.K.
Reference9 articles.
1. Information hiding in communication networks;Mazurczyk,2016
2. Mike Sieffert, Rodney Forbes, Charles Green, Leonard Popyack, Thomas Blake. Assured Information Security: Stego Intrusion Detection System. The Digital Forensic Research Conference; 2004.
3. J. Zhai, G. Liu, Y. Dai. Detection of TCP covert channel based on Markov Model. Telecommun Syst; 2013. p. 333-343.
4. Dittmann J, Hesse D, Hillert R. Steganography and steganalysis in voice-over IP scenarios: operational aspects and first experiences with a new steganalysis tool set. In: Proc SPIE, Vol 5681, Security, Steganography, and Watermarking of Multimedia Contents VII, San Jose; 2005. p. 607–618.
5. Taeshik Sohn, Jung Taek Seo, and Jongsub Moon. A study on the covert channel detection of TCP/IP header using support vector machine. In Proceedings of the 5th international conference of information and community security; 2003. p. 313–324.
Cited by
8 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献