{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T18:15:38Z","timestamp":1775067338874,"version":"3.50.1"},"reference-count":23,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,9]]},"DOI":"10.1109\/cns.2015.7346830","type":"proceedings-article","created":{"date-parts":[[2015,12,8]],"date-time":"2015-12-08T17:19:48Z","timestamp":1449595188000},"page":"209-217","source":"Crossref","is-referenced-by-count":50,"title":["Practical covert channels for WiFi systems"],"prefix":"10.1109","author":[{"given":"Jiska","family":"Classen","sequence":"first","affiliation":[]},{"given":"Matthias","family":"Schulz","sequence":"additional","affiliation":[]},{"given":"Matthias","family":"Hollick","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","author":"grabski","year":"2013","journal-title":"Steganography in OFDM symbols of fast IEEE 802 11n networks In Security and Privacy Workshops IEEE"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM.2010.5680484"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/1161366.1161371"},{"key":"ref13","article-title":"WLAN steganography revisited","author":"kr\u00e4tzer","year":"2008","journal-title":"Electronic Imaging"},{"key":"ref14","article-title":"PHY-Iayer authentication using hierarchical modulation and duo binary signaling","author":"kumar","year":"2014","journal-title":"International Conference on Computing Networking and Communications IEEE"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/362375.362389"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ICSNC.2010.11"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1016\/j.jcss.2013.06.013"},{"key":"ref18","article-title":"HICCUPS: hidden communication system for corrupted networks","author":"szczypiorski","year":"2003","journal-title":"International Multi-Conference on Advanced Computer Systems"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/1998412.1998428"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2013.6638195"},{"key":"ref3","volume":"18","author":"bayraktaroglu","year":"2013","journal-title":"Performance of IEEE 802 11 under jamming Mobile Networks and Applications"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-36373-3_11"},{"key":"ref5","article-title":"Wi-Fi Advanced Stealth","author":"butti","year":"2006","journal-title":"Proceedings"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/CRISIS.2008.4757487"},{"key":"ref7","article-title":"TGn channel models","author":"erceg","year":"0","journal-title":"IEEE 802 11&#x2013;03\/940r4 2004"},{"key":"ref2","year":"0"},{"key":"ref1","year":"0"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2010.5684218"},{"key":"ref20","article-title":"The Institute of Electrical and Electronic Engineers","year":"2012","journal-title":"IEEE 802 11g Standard IEEE Standard for Information Technology"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2007.916273"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/2018436.2018518"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2007.4317620"}],"event":{"name":"2015 IEEE Conference on Communications and Network Security (CNS)","location":"Florence, Italy","start":{"date-parts":[[2015,9,28]]},"end":{"date-parts":[[2015,9,30]]}},"container-title":["2015 IEEE Conference on Communications and Network Security (CNS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7336674\/7346791\/07346830.pdf?arnumber=7346830","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,24]],"date-time":"2017-03-24T21:06:01Z","timestamp":1490389561000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7346830\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,9]]},"references-count":23,"URL":"https:\/\/doi.org\/10.1109\/cns.2015.7346830","relation":{},"subject":[],"published":{"date-parts":[[2015,9]]}}}