Author of the publication

A Long-Term Perspective of the Internet Susceptibility to Covert Channels.

, , and . IEEE Commun. Mag., 61 (10): 171-177 (October 2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

SDN-based Mitigation of Scanning Attacks for the 5G Internet of Radio Light System., , , , and . ARES, page 49. ACM, (2018)Detecting Network Covert Channels using Machine Learning, Data Mining and Hierarchical Organisation of Frequent Sets., , , and . J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 12 (1): 20-43 (2021)Efficient distributed network covert channels for Internet of things environments†., , , , and . J. Cybersecur., (2020)A Long-Term Perspective of the Internet Susceptibility to Covert Channels., , and . IEEE Commun. Mag., 61 (10): 171-177 (October 2023)Network covert channels detection using data mining and hierarchical organisation of frequent sets: an initial study., , , and . ARES, page 69:1-69:10. ACM, (2020)Study of the Error Detection and Correction Scheme for Distributed Network Covert Channels., , , and . ARES, page 73:1-73:8. ACM, (2021)Towards Distributed Network Covert Channels Detection Using Data Mining-based Approach., , , and . ARES, page 12:1-12:10. ACM, (2018)Fine-tuning of Distributed Network Covert Channels Parameters and Their Impact on Undetectability., , , and . ARES, page 65:1-65:8. ACM, (2019)Sniffing Detection within the Network: Revisiting Existing and Proposing Novel Approaches., , , , and . ARES, page 108:1-108:8. ACM, (2019)The impact of malware evolution on the analysis methods and infrastructure., , , , and . FedCSIS, volume 11 of Annals of Computer Science and Information Systems, page 549-553. (2017)