Author of the publication

Using Insider Swapping of Time Intervals to Perform Highly Invisible Network Flow Watermarking.

, , , , , and . Secur. Commun. Networks, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Detection of Triple JPEG Compressed Color Images., , , and . IEEE Access, (2019)Quaternion Convolutional Neural Network for Color Image Classification and Forensics., , , , , and . IEEE Access, (2019)Designing Analog Fountain Timing Channels: Undetectability, Robustness, and Model-Adaptation., , , , and . IEEE Trans. Inf. Forensics Secur., 11 (4): 677-690 (2016)Detection of TCP covert channel based on Markov model., , and . Telecommun. Syst., 54 (3): 333-343 (2013)Prospect Theoretic Study of Honeypot Defense Against Advanced Persistent Threats in Power Grid., , , , , , and . IEEE Access, (2020)Sound Texture Generative Model Guided by a Lossless Mel-Frequency Convolutional Neural Network., , , , and . IEEE Access, (2018)A Construction Scheme of Steganographic Codes Based on Matrix Unwrapping., , , and . ICCCS (1), volume 10039 of Lecture Notes in Computer Science, page 166-177. (2016)A Comprehensive Analysis of Interval Based Network Flow Watermarking., , , , , , and . ICCCS (4), volume 11066 of Lecture Notes in Computer Science, page 72-84. Springer, (2018)An Improved ICS Honeypot Based on SNAP7 and IMUNES., , and . ICCCS (1), volume 11063 of Lecture Notes in Computer Science, page 303-313. Springer, (2018)A Novel Detection Method for Word-Based DGA., , , , , , and . ICCCS (2), volume 11064 of Lecture Notes in Computer Science, page 472-483. Springer, (2018)