Pareto-Optimal Covert Channels in Sensor Data Transmission
|
2022-04-26 |
Kleptography in Authentication Protocols: Why is it Still Possible?
|
2022-04-26 |
VHS-22 - A Very Heterogeneous Set of Network Traffic Data for Threat Detection
|
2022-04-26 |
Learning Model Generalisation for Bot Detection
|
2022-04-26 |
Replication study challenges and new number formats for chaotic pseudo random number generators
|
2022-01-21 |
An Effective and Efficient Approach to Improve Visibility Over Network Communications
|
2021-12-31 |
Code Layering for the Detection of Network Covert Channels in Agentless Systems
|
2021-12-05 |
How to Effectively Collect and Process Network Data for Intrusion Detection?
|
2021-11-18 |
Multilevel Network Steganography in Fountain Codes
|
2021-11-10 |
How to Make an Intrusion Detection System Aware of Steganographic Transmission
|
2021-11-10 |
The proposition of balanced and explainable surrogate method for network intrusion detection in streamed real difficult data
|
2021-09-27 |
Wiretapping Pods and Nodes - Lawful Interception in Kubernetes
|
2021-09-16 |
A Revised Taxonomy of Steganography Embedding Patterns
|
2021-08-17 |
Network Intrusion Detection in the Wild - the Orange use case in the SIMARGL project
|
2021-08-17 |
bccstego: A Framework for Investigating Network Covert Channels
|
2021-08-17 |
pcapStego: A Tool for Generating Traffic Traces for Experimenting with Network Covert Channels
|
2021-08-17 |
Detecting Covert Channels Through Code Augmentation
|
2021-08-09 |
Sanitization of Images Containing Stegomalware via Machine Learning Approaches
|
2021-08-09 |
Encapcap: Transforming Network Traces to Virtual Networks
|
2021-07-26 |
The Proposition and Evaluation of the RoEduNet-SIMARGL2021 Network Intrusion Detection Dataset
|
2021-06-24 |