Author of the publication

A Comprehensive Analysis of Interval Based Network Flow Watermarking.

, , , , , , and . ICCCS (4), volume 11066 of Lecture Notes in Computer Science, page 72-84. Springer, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Semi-Fragile Watermarking Authentication with Local and Global Watermarks., , , , and . AIAI, volume 204 of IFIP, page 681-688. Springer, (2006)Secure multimedia watermarking authentication in wavelet domain., , , , , and . J. Electronic Imaging, 17 (3): 033010 (2008)Network Packet Length Covert Channel Based on Empirical Distribution Function., , and . J. Networks, 9 (6): 1440-1446 (2014)Using Insider Swapping of Time Intervals to Perform Highly Invisible Network Flow Watermarking., , , , , and . Secur. Commun. Networks, (2018)Detecting JitterBug covert timing channel with sparse embedding., , , and . Secur. Commun. Networks, 9 (11): 1509-1519 (2016)Efficient quantum secret sharing., and . Quantum Inf. Process., 15 (5): 2091-2100 (2016)Detecting Stealthy Domain Generation Algorithms Using Heterogeneous Deep Neural Network Framework., , , , and . IEEE Access, (2020)Network covert timing channel with distribution matching., , and . Telecommun. Syst., 49 (2): 199-205 (2012)A Modified PSO Algorithm for Parameters Identification of the Double-Dispersion Cole Model., , , , , and . J. Circuits Syst. Comput., 27 (13): 1850210:1-1850210:16 (2018)Designing Rich-Secure Network Covert Timing Channels Based on Nested Lattices., , , , and . KSII Trans. Internet Inf. Syst., 13 (4): 1866-1883 (2019)