{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,4,25]],"date-time":"2024-04-25T10:28:04Z","timestamp":1714040884308},"reference-count":7,"publisher":"Springer Science and Business Media LLC","issue":"2","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Telecommun Syst"],"published-print":{"date-parts":[[2012,2]]},"DOI":"10.1007\/s11235-010-9363-6","type":"journal-article","created":{"date-parts":[[2010,6,28]],"date-time":"2010-06-28T21:43:11Z","timestamp":1277761391000},"page":"255-259","source":"Crossref","is-referenced-by-count":9,"title":["A performance analysis of HICCUPS\u2014a steganographic system for WLAN"],"prefix":"10.1007","volume":"49","author":[{"given":"Krzysztof","family":"Szczypiorski","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2010,6,29]]},"reference":[{"key":"9363_CR1","doi-asserted-by":"crossref","unstructured":"Kr\u00e4tzer, C., Dittmann, J., Lang, A., & K\u00fchne, T. (2006). WLAN steganography: a first practical review. In Proc. of 8th ACM Multimedia and Security Workshop, Geneve (Switzerland), 26\u201327 September 2006.","DOI":"10.1145\/1161366.1161371"},{"issue":"10","key":"9363_CR2","doi-asserted-by":"crossref","first-page":"1309","DOI":"10.1631\/jzus.A0720128","volume":"9","author":"K. Szczypiorski","year":"2008","unstructured":"Szczypiorski, K., & Lubacz, J. (2008). Performance analysis of IEEE 802.11 DCF networks. Journal of Zhejiang University\u2014Science A, 9(10), 1309\u20131317.","journal-title":"Journal of Zhejiang University\u2014Science A"},{"key":"9363_CR3","series-title":"Lecture notes in computer science (LNCS)","doi-asserted-by":"crossref","first-page":"1084","DOI":"10.1007\/978-3-540-72990-7_93","volume-title":"Managing traffic performance in converged networks","author":"K. Szczypiorski","year":"2007","unstructured":"Szczypiorski, K., & Lubacz, J. (2007). Performance evaluation of IEEE 802.11 DCF networks. In L.\u00a0Mason, T.\u00a0Drwiega, & J.\u00a0Yan (Eds.), Lecture notes in computer science (LNCS) : Vol. 4516. Managing traffic performance in converged networks (pp. 1084\u20131095). Proc. of 20th international teletraffic congress\u2014ITC-20, Ottawa, Canada, 17\u201321 June 2007. Berlin: Springer."},{"key":"9363_CR4","series-title":"IFIP","doi-asserted-by":"crossref","first-page":"196","DOI":"10.1007\/978-0-387-74159-8_19","volume-title":"Personal wireless communications","author":"K. Szczypiorski","year":"2007","unstructured":"Szczypiorski, K., & Lubacz, J. (2007). Saturation throughput analysis of IEEE 802.11g (ERP-OFDM) networks. In R.\u00a0Bestak, B.\u00a0Simak, & E.\u00a0Kozlowska (Eds.), IFIP : Vol. 245. Personal wireless communications (pp. 196\u2013205). Proc. of 12th IFIP international conference on personal wireless communications\u2014PWC\u201907, Prague, Czech Republic, 12\u201314 September 2007. Boston: Springer."},{"issue":"12","key":"9363_CR5","doi-asserted-by":"crossref","first-page":"45","DOI":"10.1007\/s11235-008-9090-4","volume":"38","author":"K. Szczypiorski","year":"2008","unstructured":"Szczypiorski, K., & Lubacz, J. (2008). Saturation throughput analysis of IEEE 802.11g (ERP-OFDM) networks. Telecommunication Systems: Modelling, Analysis, Design and Management, 38(12), 45\u201352.","journal-title":"Telecommunication Systems: Modelling, Analysis, Design and Management"},{"key":"9363_CR6","unstructured":"Szczypiorski, K. (2004). HICCUPS: hidden communication system for corrupted networks. In Proc. the tenth international multi-conference on advanced computer systems. ACS\u20192003, Mi\u0119dzyzdroje, 22\u201324 October 2004 (pp. 31\u201340)."},{"key":"9363_CR7","unstructured":"Szczypiorski, K. (2006). Steganography in wireless local area networks. PhD thesis, Warsaw, September 2006, Warsaw University of Technology (in Polish)."}],"container-title":["Telecommunication Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/www.springerlink.com\/index\/pdf\/10.1007\/s11235-010-9363-6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,30]],"date-time":"2019-05-30T14:07:48Z","timestamp":1559225268000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11235-010-9363-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,6,29]]},"references-count":7,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2012,2]]}},"alternative-id":["9363"],"URL":"https:\/\/doi.org\/10.1007\/s11235-010-9363-6","relation":{},"ISSN":["1018-4864","1572-9451"],"issn-type":[{"value":"1018-4864","type":"print"},{"value":"1572-9451","type":"electronic"}],"subject":[],"published":{"date-parts":[[2010,6,29]]}}}