Title | Journal | Journal Categories | Citations | Publication Date |
---|---|---|---|---|
Covert timing channels for IoT over mobile networks | 2018 | |||
The new threats of information hiding: the road ahead | 2018 | |||
Steganography for Cyber-physicalSystems | Journal of Cyber Security and Mobility | 4 | 2017 | |
A survey on internet of things: architecture, enabling technologies, security and privacy, and applications | IEEE Internet of Things Journal | 2017 | ||
Hiding information in a Stream Control Transmission Protocol | Computer Communications |
| 15 | 2012 |
Title | Journal | Journal Categories | Citations | Publication Date |
---|---|---|---|---|
Performance evaluation of Raspberry Pi 4 and STM32 Nucleo boards for security-related operations in IoT environments | Computer Networks |
| 2024 | |
Privacy-preserving data dissemination scheme based on Searchable Encryption, publish–subscribe model, and edge computing | Computer Communications |
| 1 | 2023 |
Weaknesses of Popular and Recent Covert Channel Detection Methods and a Remedy | IEEE Transactions on Dependable and Secure Computing |
| 2023 | |
Covert Channel Detection: Machine Learning Approaches | IEEE Access |
| 1 | 2022 |
Analysis of Reversible Network Covert Channels | IEEE Access |
| 2022 |