Author:
Mazurczyk Wojciech,Caviglione Luca
Publisher
Institute of Electrical and Electronics Engineers (IEEE)
Subject
Law,Electrical and Electronic Engineering,Computer Networks and Communications
Cited by
74 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. A Comprehensive Pattern-based Overview of Stegomalware;Proceedings of the 19th International Conference on Availability, Reliability and Security;2024-07-30
2. Text Steganography Methods and their Influence in Malware: A Comprehensive Overview and Evaluation;Proceedings of the 2024 ACM Workshop on Information Hiding and Multimedia Security;2024-06-24
3. A model for evaluating the robustness of network covert channels based on entropy TOPSIS method;Proceedings of the 2024 3rd International Conference on Cyber Security, Artificial Intelligence and Digital Economy;2024-03
4. Erasing the Shadow: Sanitization of Images with Malicious Payloads Using Deep Autoencoders;Lecture Notes in Computer Science;2024
5. CONNECTION: COvert chaNnel NEtwork attaCk Through bIt-rate mOdulatioN;Communications in Computer and Information Science;2024