Share This Author
Software-Defined Networking-based Crypto Ransomware Detection Using HTTP Traffic Characteristics
LACK—a VoIP steganographic method
The analytical results presented in the paper concern the influence of LACK’s hidden data insertion procedure on the method’'s impact on quality of voice transmission and its resistance to steganalysis.
Using Software-Defined Networking for Ransomware Mitigation: The Case of CryptoWall
The design of an SDN-based system is described, implemented using OpenFlow, that facilitates a timely reaction to this threat, and is a crucial factor in the case of crypto ransomware.
VoIP steganography and its Detection—A survey
- W. Mazurczyk
- Computer ScienceACM Comput. Surv.
- 20 March 2012
This article is a first survey of the existing Voice over IP (VoIP) steganography methods and their countermeasures.
Steganography of VoIP Streams
The results of the experiment, that was performed to estimate a total amount of data that can be covertly transferred during typical VoIP conversation phase, regardless of steganalysis, are also included in this paper.
Multi-segment Green Light Optimal Speed Advisory
- Marcin Seredynski, W. Mazurczyk, D. Khadraoui
- BusinessIEEE International Symposium on Parallel…
- 20 May 2013
This article introduces a new approach-a multi segment GLOSA-according to which several lights in sequence on a vehicle's route are taken into account, and demonstrates, that in free-flow conditions such multi-segmentGLOSA results in much better results when compared with single-se segment approach.
- W. Mazurczyk, K. Szczypiorski, Zoran Duric, Dengpan Ye
- Computer ScienceSecur. Commun. Networks
- 1 October 2016
This special issue of high-quality research papers provides a view on the latest research advances and results in the field of digital forensics and to present the development of tools and techniques which assist the investigation process of potentially illegal cyber activity.
Evaluation of steganographic methods for oversized IP packets
New network steganography methods that utilize mechanisms for handling oversized IP packets: IP fragmentation, PMTUD (Path MTU Discovery) and PLPMTud (Packetization Layer Path MTU discovery) are described.
Seeing the Unseen: Revealing Mobile Malware Hidden Communications via Energy Consumption and Artificial Intelligence
- L. Caviglione, Mauro Gaggero, Jean-François Lalande, W. Mazurczyk, Marcin Urbanski
- Computer ScienceIEEE Transactions on Information Forensics and…
- 1 April 2016
Experimental results show the feasibility and effectiveness of the proposed approach to detect the hidden data exchange between colluding applications, based on artificial intelligence tools, such as neural networks and decision trees.
The Future of Digital Forensics: Challenges and the Road Ahead
The future of digital forensics is explored, with an emphasis on these challenges and the advancements needed to effectively protect modern societies and pursue cybercriminals.