Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
network steganography
biblio
Improving Data Hiding Methods in Network Steganography Based on Packet Header Manipulation
Submitted by grigby1 on Thu, 10/06/2022 - 3:21pm
information science
Packet header manipulation
network steganography
covert channels
Resiliency
network protocols
Communications technology
Communication channels
Steganography
pubcrawl
Named Data Network Security
resilience
Receivers
Protocols
internet
Scalability
Human Factors
Human behavior
biblio
Detection of Covert Timing Channels with Machine Learning Methods Using Different Window Sizes
Submitted by grigby1 on Thu, 07/16/2020 - 12:17pm
machine learning methods
window sizes
Vectors
timing
telecommunication channels
TCPIP
Scalability
Resiliency
resilience
pubcrawl
Protocols
network steganography
composability
machine learning
Linux
learning (artificial intelligence)
information security
hidden data
feature extraction
data packets
covert timing channel
covert channels
computer network security
Compositionality
biblio
Enhanced TCP Sequence Number Steganography Using Dynamic Identifier
Submitted by grigby1 on Mon, 02/10/2020 - 11:42am
classifiers
composability
ISN
Metrics
network steganography
Packets
privacy
pubcrawl
Steganography
steganography detection
transmission control protocol
biblio
IPv6 Covert Channels in the Wild
Submitted by grigby1 on Tue, 01/21/2020 - 12:09pm
collaboration
composability
Information hiding
IPv6
ipv6 security
Metrics
network covert channels
network steganography
policy-based governance
pubcrawl
resilience
Resiliency
biblio
Inter-Protocol Steganography for Real-Time Services and Its Detection Using Traffic Coloring Approach
Submitted by grigby1 on Tue, 05/01/2018 - 11:33am
network steganography
Traffic Coloring
steganography detection approach
steganography detection
Steganography
RTP
RTCP
real-time systems
real-time services
pubcrawl
Protocols
privacy
overt protocols
network traffic coloring
network threats
Bandwidth
Metrics
malicious control server
inter-protocol steganography
inter-protocol hiding techniques
Information hiding
Google
Electronic mail
delays
defensive systems
Data visualization
data encapsulation
Cryptographic Protocols
computer network security
composability