All Stories

  1. A Survey of Internet Censorship and its Measurement: Methodology, Trends, and Challenges
  2. Identifying Overlapping Ideas and Concepts of Methods that Hide Information
  3. Development of the trigger-controlling system for the proton computed tomography prototype
  4. Combining Different Existing Methods for Describing Steganography Hiding Methods
  5. Domainator: Detecting and Identifying DNS-Tunneling Malware Using Metadata Sequences
  6. DYST (Did You See That?): An Amplified Covert Channel That Points To Previously Seen Data
  7. Editorial: Fighting Cybersecurity Risks from a Multidisciplinary Perspective
  8. Analysis of network traffic hiding techniques in modern malware (computer viruses)
  9. Robust and Homomorphic Covert Channels in Streams of Numeric Data
  10. A Case Study on the Detection of Hash-Chain-based Covert Channels Using Heuristics and Machine Learning
  11. Look What’s There! Utilizing the Internet’s Existing Data for Censorship Circumvention with OPPRESSION
  12. Exploration of differentiability in a proton computed tomography simulation framework
  13. Power Consumption Analysis as a Detection Indicator for Cyberattacks on Smart Home Devices
  14. Towards Neural Charged Particle Tracking in Digital Tracking Calorimeters With Reinforcement Learning
  15. Weaknesses of Popular and Recent Covert Channel Detection Methods and a Remedy
  16. Uncertainty-aware spot rejection rate as quality metric for proton therapy using a digital tracking calorimeter
  17. Why people replace their aging smart devices: A push–pull–mooring perspective
  18. The Bergen proton CT system
  19. Towards Neural Charged Particle Tracking in Digital Tracking Calorimeters with Reinforcement Learning
  20. Avoiding Research Tribal Wars Using Taxonomies
  21. Challenging Channels: Encrypted Covert Channels within Challenge-Response Authentication
  22. A Generic Taxonomy for Steganography Methods
  23. Towards Passive Identification of Aged Android Devices in the Home Network
  24. Steganography Hiding Patterns: A Brief Review
  25. SoK
  26. Guest editorial: Information security methodology and replication studies
  27. Emerging topics in defending networked systems
  28. Information Hiding in the DICOM Message Service and Upper Layer Service with Entropy-Based Detection
  29. Analysis of Reversible Network Covert Channels
  30. Security and Privacy Issues of Home Globalization
  31. Detection of Anomalous Values within TIA Project Data History for Industrial Control Systems
  32. How Feasible are Steganographic and Stealth Attacks on TIA Project Metadata of ICS: A Case Study with Real-world Data
  33. Reset- and Reconnection-based Covert Channels in CoAP
  34. Risks and Opportunities for Information Hiding in DICOM Standard
  35. A Revised Taxonomy of Steganography Embedding Patterns
  36. Hunting Shadows: Towards Packet Runtime-based Detection Of Computational Intensive Reversible Covert Channels
  37. Crème de la Crème: Lessons from Papers in Security Publications
  38. Investigating particle track topology for range telescopes in particle radiography using convolutional neural networks
  39. Comprehensive analysis of MQTT 5.0 susceptibility to network covert channels
  40. Reversible and Plausibly Deniable Covert Channels in One-Time Passwords Based on Hash Chains
  41. Reconnection-Based Covert Channels in Wireless Networks
  42. IT-Sicherheit für TCP/IP- und IoT-Netzwerke
  43. Anomaly Detection in ICS based on Data-history Analysis
  44. Covert Channels in One-Time Passwords Based on Hash Chains
  45. Covert storage caches using the NTP protocol
  46. Design and performance evaluation of reversible network covert channels
  47. Information Security Methodology, Replication Studies and Information Security Education
  48. Guest Editorial: Recent Advances in Cyber-Physical Security in Industrial Environments
  49. Not all areas are equal: analysis of citations in information security research
  50. Introducing Dead Drops to Network Steganography using ARP-Caches and SNMP-Walks
  51. Towards Reversible Storage Network Covert Channels
  52. Protocol-independent Detection of "Messaging Ordering" Network Covert Channels
  53. Countering adaptive network covert communication with dynamic wardens
  54. Covert Channels in the MQTT-Based Internet of Things
  55. Recent Advancements in Digital Forensics, Part 2
  56. One Countermeasure, Multiple Patterns
  57. Towards Deriving Insights into Data Hiding Methods Using Pattern-based Approach
  58. Get Me Cited, Scotty!
  59. The New Threats of Information Hiding: The Road Ahead
  60. Emerging and Unconventional: New Attacks and Innovative Detection Techniques
  61. Detection of Covert Channels in TCP Retransmissions
  62. IT-Sicherheit für TCP/IP- und IoT-Netzwerke
  63. Information hiding
  64. Recent Advancements in Digital Forensics
  65. The Future of Digital Forensics: Challenges and the Road Ahead
  66. Cyber Security of Smart Buildings
  67. Inter-Protocol Steganography for Real-Time Services and Its Detection Using Traffic Coloring Approach
  68. Ant Colony-Inspired Parallel Algorithm to Improve Cryptographic Pseudo Random Number Generators
  69. Don’t You Touch My Nuts: Information Hiding in Cyber Physical Systems
  70. Network Information Hiding and Science 2.0: Can it be a Match?
  71. Enhanced Ant Colony-Inspired ParallelAlgorithm to Improve Cryptographic PRNGs
  72. Steganography for Cyber-physicalSystems
  73. POSTER
  74. IoT Security: The Improvement-Decelerating 'Cycle of Blame'
  75. Micro protocol engineering for unstructured carriers: on the embedding of steganographic control protocols into audio transmissions
  76. How to increase the security of smart buildings?
  77. Covert channel-internal control protocols: attacks and defense
  78. Information Hiding in Communication Networks: Fundamentals, Mechanisms, Applications, and Countermeasures
  79. Countermeasures for Covert Channel-Internal Control Protocols
  80. Pattern-Based Survey and Categorization of Network Covert Channel Techniques
  81. Analysis of Human Awareness of Security and Privacy Threats in Smart Environments
  82. Securing BACnet’s Pitfalls
  83. Visualizing BACnet Data to Facilitate Humans in Building-Security Decision-Making
  84. “The Good, The Bad and The Ugly”: Evaluation of Wi-Fi Steganography
  85. On importance of steganographic cost for network steganography
  86. Hidden and under control
  87. Hidden and Uncontrolled – On the Emergence of Network Steganographic Threats
  88. IT-gestütztes Management und Controlling
  89. Hiding Privacy Leaks in Android Applications Using Low-Attention Raising Covert Channels
  90. Covert Channels and Their Prevention in Building Automation Protocols: A Prototype Exemplified Using BACnet
  91. Detecting protocol switching covert channels
  92. Covert and side channels in buildings and the prototype of a building-aware active warden
  93. Einführung
  94. Fortgeschrittene Themen für verdeckte Kanäle
  95. Geheimes Tunneling
  96. Grundlagen verdeckter Kanäle
  97. Prävention und Detektion verdeckter Kanäle
  98. Systematic Engineering of Control Protocols for Covert Channels
  99. TCP/IP-Grundlagen für das Tunneling
  100. Tunnel und verdeckte Kanäle im Netz
  101. Tunneling-Protokolle
  102. A secure interoperable architecture for building-automation applications
  103. Low-Attention Forwarding for Mobile Network Covert Channels