From post

A Hybrid Covert Channel with Feedback over Mobile Networks.

, , , , , и . SocialSec, том 1095 из Communications in Computer and Information Science, стр. 87-94. Springer, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Efficient Secure Authenticated Key Exchange Without NAXOS' Approach Based on Decision Linear Problem., , и . CollaborateCom, том 163 из Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, стр. 243-256. Springer, (2015)Towards Paving the Way for Large-Scale Windows Malware Analysis: Generic Binary Unpacking with Orders-of-Magnitude Performance Boost., , , , , , и . CCS, стр. 395-411. ACM, (2018)ADS-B Data Authentication Based on AH Protocol., , , и . DASC, стр. 21-24. IEEE Computer Society, (2013)Propagation modeling of active P2P worms based on ternary matrix., , , , и . J. Netw. Comput. Appl., 36 (5): 1387-1394 (2013)Information Leakage in Encrypted Deduplication via Frequency Analysis: Attacks and Defenses., , , , и . ACM Trans. Storage, 16 (1): 4:1-4:30 (2020)Co-Clustering Host-Domain Graphs to Discover Malware Infection., , , , , и . AIAM (ACM), стр. 49:1-49:6. ACM, (2019)AutoSup: Driving Behaviors Recognition Supervision via Incentive Mechanism., , , , и . ICC, стр. 1-6. IEEE, (2021)A Fine-Grained Approach for Vulnerabilities Discovery Using Augmented Vulnerability Signatures., , , , и . KSEM (3), том 13370 из Lecture Notes in Computer Science, стр. 27-38. Springer, (2022)A Hybrid Covert Channel with Feedback over Mobile Networks., , , , , и . SocialSec, том 1095 из Communications in Computer and Information Science, стр. 87-94. Springer, (2019)An RTP Extension for Reliable User-Data Transmission over VoIP Traffic., , , , и . SocialSec, том 1095 из Communications in Computer and Information Science, стр. 74-86. Springer, (2019)