Cited By
View all- Mileva AVelinov AHartmann LWendzel SMazurczyk W(2021)Comprehensive analysis of MQTT 5.0 susceptibility to network covert channelsComputers and Security10.1016/j.cose.2021.102207104:COnline publication date: 1-May-2021
- Liu SFang ZGao FKoussainov BZhang ZLiu JZhu LGai KRaymond Choo KLiu J(2020)Whispers on Ethereum: Blockchain-based Covert Data Embedding SchemesProceedings of the 2nd ACM International Symposium on Blockchain and Secure Critical Infrastructure10.1145/3384943.3409433(171-179)Online publication date: 6-Oct-2020
- Radej AJanicki A(2020)Modification of Pitch Parameters in Speech Coding for Information HidingText, Speech, and Dialogue10.1007/978-3-030-58323-1_55(513-523)Online publication date: 8-Sep-2020
- Show More Cited By