All Stories

  1. History covert channels with relative timing pointers: Design, error resilience, and detectability
  2. Steganography in the QUIC Communication Protocol
  3. A Survey of Internet Censorship and its Measurement: Methodology, Trends, and Challenges
  4. Identifying Overlapping Ideas and Concepts of Methods that Hide Information
  5. Development of the trigger-controlling system for the proton computed tomography prototype
  6. Combining Different Existing Methods for Describing Steganography Hiding Methods
  7. Domainator: Detecting and Identifying DNS-Tunneling Malware Using Metadata Sequences
  8. DYST (Did You See That?): An Amplified Covert Channel That Points To Previously Seen Data
  9. Editorial: Fighting Cybersecurity Risks from a Multidisciplinary Perspective
  10. Analysis of network traffic hiding techniques in modern malware (computer viruses)
  11. Robust and Homomorphic Covert Channels in Streams of Numeric Data
  12. A Case Study on the Detection of Hash-Chain-based Covert Channels Using Heuristics and Machine Learning
  13. Look What’s There! Utilizing the Internet’s Existing Data for Censorship Circumvention with OPPRESSION
  14. Exploration of differentiability in a proton computed tomography simulation framework
  15. Power Consumption Analysis as a Detection Indicator for Cyberattacks on Smart Home Devices
  16. Towards Neural Charged Particle Tracking in Digital Tracking Calorimeters With Reinforcement Learning
  17. Weaknesses of Popular and Recent Covert Channel Detection Methods and a Remedy
  18. Uncertainty-aware spot rejection rate as quality metric for proton therapy using a digital tracking calorimeter
  19. Why people replace their aging smart devices: A push–pull–mooring perspective
  20. The Bergen proton CT system
  21. Towards Neural Charged Particle Tracking in Digital Tracking Calorimeters with Reinforcement Learning
  22. Avoiding Research Tribal Wars Using Taxonomies
  23. Challenging Channels: Encrypted Covert Channels within Challenge-Response Authentication
  24. A Generic Taxonomy for Steganography Methods
  25. Towards Passive Identification of Aged Android Devices in the Home Network
  26. Steganography Hiding Patterns: A Brief Review
  27. SoK
  28. Guest editorial: Information security methodology and replication studies
  29. Emerging topics in defending networked systems
  30. Information Hiding in the DICOM Message Service and Upper Layer Service with Entropy-Based Detection
  31. Analysis of Reversible Network Covert Channels
  32. Security and Privacy Issues of Home Globalization
  33. Detection of Anomalous Values within TIA Project Data History for Industrial Control Systems
  34. How Feasible are Steganographic and Stealth Attacks on TIA Project Metadata of ICS: A Case Study with Real-world Data
  35. Reset- and Reconnection-based Covert Channels in CoAP
  36. Risks and Opportunities for Information Hiding in DICOM Standard
  37. A Revised Taxonomy of Steganography Embedding Patterns
  38. Hunting Shadows: Towards Packet Runtime-based Detection Of Computational Intensive Reversible Covert Channels
  39. Crème de la Crème: Lessons from Papers in Security Publications
  40. Investigating particle track topology for range telescopes in particle radiography using convolutional neural networks
  41. Comprehensive analysis of MQTT 5.0 susceptibility to network covert channels
  42. Reversible and Plausibly Deniable Covert Channels in One-Time Passwords Based on Hash Chains
  43. Reconnection-Based Covert Channels in Wireless Networks
  44. IT-Sicherheit für TCP/IP- und IoT-Netzwerke
  45. Anomaly Detection in ICS based on Data-history Analysis
  46. Covert Channels in One-Time Passwords Based on Hash Chains
  47. Covert storage caches using the NTP protocol
  48. Design and performance evaluation of reversible network covert channels
  49. Information Security Methodology, Replication Studies and Information Security Education
  50. Guest Editorial: Recent Advances in Cyber-Physical Security in Industrial Environments
  51. Not all areas are equal: analysis of citations in information security research
  52. Introducing Dead Drops to Network Steganography using ARP-Caches and SNMP-Walks
  53. Towards Reversible Storage Network Covert Channels
  54. Protocol-independent Detection of "Messaging Ordering" Network Covert Channels
  55. Countering adaptive network covert communication with dynamic wardens
  56. Covert Channels in the MQTT-Based Internet of Things
  57. Recent Advancements in Digital Forensics, Part 2
  58. One Countermeasure, Multiple Patterns
  59. Towards Deriving Insights into Data Hiding Methods Using Pattern-based Approach
  60. Get Me Cited, Scotty!
  61. The New Threats of Information Hiding: The Road Ahead
  62. Emerging and Unconventional: New Attacks and Innovative Detection Techniques
  63. Detection of Covert Channels in TCP Retransmissions
  64. IT-Sicherheit für TCP/IP- und IoT-Netzwerke
  65. Information hiding
  66. Recent Advancements in Digital Forensics
  67. The Future of Digital Forensics: Challenges and the Road Ahead
  68. Cyber Security of Smart Buildings
  69. Inter-Protocol Steganography for Real-Time Services and Its Detection Using Traffic Coloring Approach
  70. Ant Colony-Inspired Parallel Algorithm to Improve Cryptographic Pseudo Random Number Generators
  71. Don’t You Touch My Nuts: Information Hiding in Cyber Physical Systems
  72. Network Information Hiding and Science 2.0: Can it be a Match?
  73. Enhanced Ant Colony-Inspired ParallelAlgorithm to Improve Cryptographic PRNGs
  74. Steganography for Cyber-physicalSystems
  75. POSTER
  76. IoT Security: The Improvement-Decelerating 'Cycle of Blame'
  77. Micro protocol engineering for unstructured carriers: on the embedding of steganographic control protocols into audio transmissions
  78. How to increase the security of smart buildings?
  79. Covert channel-internal control protocols: attacks and defense
  80. Information Hiding in Communication Networks: Fundamentals, Mechanisms, Applications, and Countermeasures
  81. Countermeasures for Covert Channel-Internal Control Protocols
  82. Pattern-Based Survey and Categorization of Network Covert Channel Techniques
  83. Analysis of Human Awareness of Security and Privacy Threats in Smart Environments
  84. Securing BACnet’s Pitfalls
  85. Visualizing BACnet Data to Facilitate Humans in Building-Security Decision-Making
  86. “The Good, The Bad and The Ugly”: Evaluation of Wi-Fi Steganography
  87. On importance of steganographic cost for network steganography
  88. Hidden and under control
  89. Hidden and Uncontrolled – On the Emergence of Network Steganographic Threats
  90. IT-gestütztes Management und Controlling
  91. Hiding Privacy Leaks in Android Applications Using Low-Attention Raising Covert Channels
  92. Covert Channels and Their Prevention in Building Automation Protocols: A Prototype Exemplified Using BACnet
  93. Detecting protocol switching covert channels
  94. Covert and side channels in buildings and the prototype of a building-aware active warden
  95. Einführung
  96. Fortgeschrittene Themen für verdeckte Kanäle
  97. Geheimes Tunneling
  98. Grundlagen verdeckter Kanäle
  99. Prävention und Detektion verdeckter Kanäle
  100. Systematic Engineering of Control Protocols for Covert Channels
  101. TCP/IP-Grundlagen für das Tunneling
  102. Tunnel und verdeckte Kanäle im Netz
  103. Tunneling-Protokolle
  104. A secure interoperable architecture for building-automation applications
  105. Low-Attention Forwarding for Mobile Network Covert Channels