Krzysztof Szczypiorski

Orcid: 0000-0001-8638-8584

According to our database1, Krzysztof Szczypiorski authored at least 92 papers between 2005 and 2022.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2022
StegFog: Distributed Steganography Applied to Cyber Resiliency in Multi Node Environments.
IEEE Access, 2022

5G-Enabled Defence-in-Depth for Multi-domain Operations.
Proceedings of the IEEE Military Communications Conference, 2022

The design of the simple SMM rootkit.
Proceedings of the icWCSN 2022: 9th international Conference on Wireless Communication and Sensor Networks, Dalian, China, January 11, 2022

An Evaluation of Meltdown Vulnerability.
Proceedings of the icWCSN 2022: 9th international Conference on Wireless Communication and Sensor Networks, Dalian, China, January 11, 2022

2019
Mobile Agents for Detecting Network Attacks Using Timing Covert Channels.
J. Univers. Comput. Sci., 2019

Methods for Information Hiding in Open Social Networks.
J. Univers. Comput. Sci., 2019

Preface.
Proceedings of the 5th International Conference on Frontiers of Signal Processing, 2019

2018
Big Data Analytics for Information Security.
Secur. Commun. Networks, 2018

SOMSteg - Framework for Covert Channel, and its Detection, within HTTP.
J. Univers. Comput. Sci., 2018

SHAH: Hash Function based on Irregularly Decimated Chaotic Map.
CoRR, 2018

LuxSteg: First Practical Implementation of Steganography in VLC.
IEEE Access, 2018

Towards Empowering Cyber Attack Resiliency Using Steganography.
Proceedings of the 4th International Conference on Frontiers of Signal Processing, 2018

Application of Perfectly Undetectable Network Steganography Method for Malware Hidden Communication.
Proceedings of the 4th International Conference on Frontiers of Signal Processing, 2018

2017
Steganography in VLC Systems.
J. Univers. Comput. Sci., 2017

StegIbiza: Steganography in Club Music Implemented in Python.
CoRR, 2017

Yet Another Pseudorandom Number Generator.
CoRR, 2017

Steglbiza: Steganography in club music implemented in Python.
Proceedings of the 3rd International Conference on Frontiers of Signal Processing, 2017

SocialStegDisc: Application of steganography in social networks to create a file system.
Proceedings of the 3rd International Conference on Frontiers of Signal Processing, 2017

2016
Guest Editors' Introduction: Special Issue on Cyber Crime.
IEEE Trans. Dependable Secur. Comput., 2016

Steganography in IEEE 802.11 OFDM symbols.
Secur. Commun. Networks, 2016

On importance of steganographic cost for network steganography.
Secur. Commun. Networks, 2016

Trends in modern information hiding: techniques, applications, and detection.
Secur. Commun. Networks, 2016

Cyber Crime.
Secur. Commun. Networks, 2016

Perfect undetectability of network steganography.
Secur. Commun. Networks, 2016

YouSkyde: information hiding for Skype video traffic.
Multim. Tools Appl., 2016

MoveSteg: A Method of Network Steganography Detection.
CoRR, 2016

StegHash: New Method for Information Hiding in Open Social Networks.
CoRR, 2016

Security framework with active defence system for vehicular ad hoc networks.
Proceedings of the 2nd International Conference on Frontiers of Signal Processing, 2016

StegIbiza: New method for information hiding in club music.
Proceedings of the 2nd International Conference on Frontiers of Signal Processing, 2016

Towards model-based anomaly detection in network communication protocols.
Proceedings of the 2nd International Conference on Frontiers of Signal Processing, 2016

2015
Influence of speech codecs selection on transcoding steganography.
Telecommun. Syst., 2015

On the undetectability of transcoding steganography.
Secur. Commun. Networks, 2015

"The Good, The Bad and The Ugly": Evaluation of Wi-Fi Steganography.
J. Commun., 2015

Why Do Older Adults Prefer Some Radio Stations? Helping to Increase Speech Understanding.
J. Commun., 2015

StegBlocks: ensuring perfect undetectability of network steganography.
CoRR, 2015

Distributed Automated Vehicle Location (AVL) System Based on Connected Vehicle Technology.
Proceedings of the IEEE 18th International Conference on Intelligent Transportation Systems, 2015

Using Facebook for Image Steganography.
Proceedings of the 10th International Conference on Availability, Reliability and Security, 2015

Steg Blocks: Ensuring Perfect Undetectability of Network Steganography.
Proceedings of the 10th International Conference on Availability, Reliability and Security, 2015

2014
On steganography in lost audio packets.
Secur. Commun. Networks, 2014

Using transcoding for hidden communication in IP telephony.
Multim. Tools Appl., 2014

Advances in digital media security and right management.
Multim. Syst., 2014

Improving Hard Disk Contention-based Covert Channel in Cloud Computing Environment.
CoRR, 2014

Principles and overview of network steganography.
IEEE Commun. Mag., 2014

Trends in steganography.
Commun. ACM, 2014

Network forensics and challenges for cybersecurity.
Ann. des Télécommunications, 2014

Steganalysis of transcoding steganography.
Ann. des Télécommunications, 2014

Improving Hard Disk Contention-Based Covert Channel in Cloud Computing.
Proceedings of the 35. IEEE Security and Privacy Workshops, 2014

Steganography in Long Term Evolution Systems.
Proceedings of the 35. IEEE Security and Privacy Workshops, 2014

Improving Bus Ride Comfort Using GLOSA-Based Dynamic Speed Optimisation.
Proceedings of the 2014 IEEE International Parallel & Distributed Processing Symposium Workshops, 2014

2013
Networks for the e-society.
Telecommun. Syst., 2013

On information hiding in retransmissions.
Telecommun. Syst., 2013

PadSteg: introducing inter-protocol steganography.
Telecommun. Syst., 2013

Trends in modern information hiding: techniques, applications and detection.
Secur. Commun. Networks, 2013

SkyDe: a Skype-based Steganographic Method.
Int. J. Comput. Commun. Control, 2013

Performance Evaluation of Trust-Based Collaborative Sanctioning in MANETs.
Proceedings of the 12th IEEE International Conference on Trust, 2013

StegTorrent: A Steganographic Method for the P2P File Sharing Service.
Proceedings of the 2013 IEEE Symposium on Security and Privacy Workshops, 2013

Steganography in OFDM Symbols of Fast IEEE 802.11n Networks.
Proceedings of the 2013 IEEE Symposium on Security and Privacy Workshops, 2013

Vehicular ad hoc networks for joint traffic and mobility management.
Proceedings of the 5th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops, 2013

Network steganalysis: Detection of steganography in IEEE 802.11 wireless networks.
Proceedings of the 5th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops, 2013

Steganography in WiMAX networks.
Proceedings of the 5th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops, 2013

2012
Toward network steganography detection.
Telecommun. Syst., 2012

A performance analysis of HICCUPS - a steganographic system for WLAN.
Telecommun. Syst., 2012

Evaluation of steganographic methods for oversized IP packets.
Telecommun. Syst., 2012

Security and privacy issues for the network of the future.
Secur. Commun. Networks, 2012

What are suspicious VoIP delays?
Multim. Tools Appl., 2012

Multilevel Steganography: Improving Hidden Communication in Networks.
J. Univers. Comput. Sci., 2012

The Advent of Steganography in Computing Environments
CoRR, 2012

Hiding information in a Stream Control Transmission Protocol.
Comput. Commun., 2012

Toward Effective and Reliable Digital Forensics.
Comput. J., 2012

Towards steganography detection through network traffic visualisation.
Proceedings of the 4th International Congress on Ultra Modern Telecommunications and Control Systems, 2012

2011
Retransmission steganography and its detection.
Soft Comput., 2011

Direct Sequence Spread Spectrum Steganographic Scheme for IEEE 802.15.4
CoRR, 2011

Is Cloud Computing Steganography-proof?
CoRR, 2011

How Hidden Can Be Even More Hidden?
CoRR, 2011

Sending Hidden Data via Google Suggest
CoRR, 2011

Multi-Level Steganography: Improving Hidden Communication in Networks
CoRR, 2011

2010
Guest editorial.
Telecommun. Syst., 2010

Retransmission Steganography Applied
CoRR, 2010

Hiding Data in OFDM Symbols of IEEE 802.11 Networks
CoRR, 2010

Stream Control Transmission Protocol Steganography
CoRR, 2010

Information Hiding Using Improper Frame Padding
CoRR, 2010

Towards Self-defending Mechanisms Using Data Mining in the EFIPSANS Framework.
Proceedings of the Advances in Multimedia and Network Information System Technologies, 2010

2009
Steganography in Handling Oversized IP Packets
CoRR, 2009

Hiding Information in Retransmissions
CoRR, 2009

2008
Saturation throughput analysis of IEEE 802.11g (ERP-OFDM) networks.
Telecommun. Syst., 2008

Steganographic Routing in Multi Agent System Environment
CoRR, 2008

Covert Channels in SIP for VoIP signalling
CoRR, 2008

TrustMAS: Trusted Communication Platform for Multi-Agent Systems.
Proceedings of the On the Move to Meaningful Internet Systems: OTM 2008, 2008

Steganography of VoIP Streams.
Proceedings of the On the Move to Meaningful Internet Systems: OTM 2008, 2008

2007
Performance Evaluation of IEEE 802.11 DCF Networks.
Proceedings of the Managing Traffic Performance in Converged Networks, 2007

2005
Micropayments with Privacy - a New Proposal for E-commerce.
Proceedings of the Information Processing and Security Systems., 2005

VAST: Versatile Anonymous System for Web Users.
Proceedings of the Enhanced Methods in Computer Security, 2005


  Loading...