Author of the publication

Detecting JitterBug covert timing channel with sparse embedding.

, , , and . Secur. Commun. Networks, 9 (11): 1509-1519 (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Assessment of Integrated Electronic Information System survivability based on u-function., , and . ICNSC, page 1837-1841. IEEE, (2008)A passive image authentication scheme for detecting region-duplication forgery with rotation., , , and . J. Netw. Comput. Appl., 34 (5): 1557-1565 (2011)基于Snort的Modbus TCP工控协议异常数据检测规则设计 (Design of Modbus TCP Industrial Control Network Protocol Abnormal Data Detection Rules Based on Snort)., , and . 计算机科学, 42 (11): 212-216 (2015)An Improved Retransmission-based Network Steganography: Design and Detection., , and . J. Networks, 8 (1): 182-188 (2013)A Wireless Covert Channel Based on Constellation Shaping Modulation., , , , , and . Secur. Commun. Networks, (2018)SkyLen: a Skype-based length covert channel., , , and . J. Inf. Hiding Multim. Signal Process., 6 (3): 473-481 (2015)A deep learning-based framework to identify and characterise heterogeneous secure network traffic., , , and . IET Inf. Secur., 17 (2): 294-308 (March 2023)An adaptive matrix embedding based on LSB matching for grey-scale images., and . Int. J. Multim. Intell. Secur., 2 (3/4): 238-251 (2011)Securing Network Traffic Classification Models against Adversarial Examples Using Derived Variables., , , , and . Future Internet, 15 (12): 405 (2023)A correlation-based approach to detecting wireless physical covert channels., , , , and . Comput. Commun., (2021)