Author of the publication

Detection of TCP covert channel based on Markov model.

, , and . Telecommun. Syst., 54 (3): 333-343 (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Semi-Fragile Watermarking Authentication with Local and Global Watermarks., , , , and . AIAI, volume 204 of IFIP, page 681-688. Springer, (2006)Secure multimedia watermarking authentication in wavelet domain., , , , , and . J. Electronic Imaging, 17 (3): 033010 (2008)Efficient quantum secret sharing., and . Quantum Inf. Process., 15 (5): 2091-2100 (2016)Detecting Stealthy Domain Generation Algorithms Using Heterogeneous Deep Neural Network Framework., , , , and . IEEE Access, (2020)Network covert timing channel with distribution matching., , and . Telecommun. Syst., 49 (2): 199-205 (2012)Network Packet Length Covert Channel Based on Empirical Distribution Function., , and . J. Networks, 9 (6): 1440-1446 (2014)A Modified PSO Algorithm for Parameters Identification of the Double-Dispersion Cole Model., , , , , and . J. Circuits Syst. Comput., 27 (13): 1850210:1-1850210:16 (2018)Detecting JitterBug covert timing channel with sparse embedding., , , and . Secur. Commun. Networks, 9 (11): 1509-1519 (2016)Using Insider Swapping of Time Intervals to Perform Highly Invisible Network Flow Watermarking., , , , , and . Secur. Commun. Networks, (2018)Designing Rich-Secure Network Covert Timing Channels Based on Nested Lattices., , , , and . KSII Trans. Internet Inf. Syst., 13 (4): 1866-1883 (2019)