Author:
Mazurczyk Wojciech,Wendzel Steffen,Zander Sebastian,Houmansadr Amir,Szczypiorski Krzysztof
Cited by
30 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Robust and Homomorphic Covert Channels in Streams of Numeric Data;Proceedings of the 19th International Conference on Availability, Reliability and Security;2024-07-30
2. A Case Study on the Detection of Hash-Chain-based Covert Channels Using Heuristics and Machine Learning;Proceedings of the 19th International Conference on Availability, Reliability and Security;2024-07-30
3. Look What’s There! Utilizing the Internet’s Existing Data for Censorship Circumvention with OPPRESSION;Proceedings of the 19th ACM Asia Conference on Computer and Communications Security;2024-07
4. Direct Sequence Spread Spectrum-Based Radio Steganography;2023 Signal Processing Symposium (SPSympo);2023-09-26
5. AirKeyLogger: Hardwareless Air-Gap Keylogging Attack;2023 IEEE 47th Annual Computers, Software, and Applications Conference (COMPSAC);2023-06