Cited By
View all- Asharani RVidyalakshmi K(2024)A Comparative Analysis on Exploration of Stegosploits across Various Media Formats2024 International Conference on Knowledge Engineering and Communication Systems (ICKECS)10.1109/ICKECS61492.2024.10616568(1-8)Online publication date: 18-Apr-2024
- Cassavia NCaviglione LGuarascio MLiguori AZuppelli M(2024)Learning autoencoder ensembles for detecting malware hidden communications in IoT ecosystemsJournal of Intelligent Information Systems10.1007/s10844-023-00819-862:4(925-949)Online publication date: 1-Aug-2024
- AL-Khulaidi NZahary AHazaa MNasser A(2023)Covert Channel Detection and Generation Techniques: A Survey2023 3rd International Conference on Emerging Smart Technologies and Applications (eSmarTA)10.1109/eSmarTA59349.2023.10293582(01-09)Online publication date: 10-Oct-2023
- Show More Cited By