Author of the publication

Information Hiding in the DICOM Message Service and Upper Layer Service with Entropy-Based Detection.

, , , , and . Entropy, 24 (2): 176 (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

IPv6 Covert Channels in the Wild., , and . CECC, page 10:1-10:6. ACM, (2019)A Revised Taxonomy of Steganography Embedding Patterns., , , , , , , , , and 1 other author(s). ARES, page 67:1-67:12. ACM, (2021)Tight Arms Race: Overview of Current Malware Threats and Trends in Their Detection., , , , , , and . IEEE Access, (2021)Code Layering for the Detection of Network Covert Channels in Agentless Systems., , , , and . IEEE Trans. Netw. Serv. Manag., 19 (3): 2282-2294 (2022)ORISHA: Improving Threat Detection through Orchestrated Information Sharing (Discussion Paper)., , , , , and . SEBD, volume 3478 of CEUR Workshop Proceedings, page 514-524. CEUR-WS.org, (2023)The "SaterLay": an Overlay System for Satellite Based Communities.. ISWCS, page 888-891. IEEE, (2005)Detecting Covert Channels Through Code Augmentation., , and . ITASEC, volume 2940 of CEUR Workshop Proceedings, page 133-144. CEUR-WS.org, (2021)Revealing MageCart-like Threats in Favicons via Artificial Intelligence., , , , and . ARES, page 45:1-45:7. ACM, (2022)What is Green Security?, , and . IAS, page 366-371. IEEE, (2011)A survey on energy-aware security mechanisms., , and . Pervasive Mob. Comput., (2015)