{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,26]],"date-time":"2025-05-26T15:45:17Z","timestamp":1748274317425},"reference-count":21,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,9]]},"DOI":"10.1109\/icumt.2013.6798398","type":"proceedings-article","created":{"date-parts":[[2014,5,2]],"date-time":"2014-05-02T14:24:25Z","timestamp":1399040665000},"page":"13-19","source":"Crossref","is-referenced-by-count":12,"title":["Network steganalysis: Detection of steganography in IEEE 802.11 wireless networks"],"prefix":"10.1109","author":[{"given":"Szymon","family":"Grabski","sequence":"first","affiliation":[]},{"given":"Krzysztof","family":"Szczypiorski","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1109\/MINES.2009.248"},{"key":"17","article-title":"Wired and wireless local area networks","author":"nowicki","year":"2002","journal-title":"Polish Oficyna Wydawnicza Politechniki Warszawskiej"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1109\/MSECP.2003.1203220"},{"key":"15","article-title":"Wlan steganography revised","author":"kra?tzer","year":"2008","journal-title":"Electronic Imaging"},{"key":"16","first-page":"134","article-title":"Network steganography","author":"lubacz","year":"0","journal-title":"Polish Telecommunication Review"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1109\/MC.1998.4655281"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1145\/1161366.1161371"},{"journal-title":"IEEE Standard 802 11-1999 Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications","year":"1999","key":"11"},{"journal-title":"Revision of IEEE Std 802","first-page":"11","year":"2007","key":"12"},{"journal-title":"Steganography in Wireless Local Area Networks","year":"2006","author":"szczypiorski","key":"21"},{"journal-title":"Kismet 802 11 Layer2 Wireless Network Detector Sniffer and Intrusion Detection System","year":"0","key":"3"},{"key":"20","first-page":"31","article-title":"Hidden communication system for corrupted networks","author":"szczypiorski","year":"2003","journal-title":"Proceedings of 10th International Multi-conference on Advanced Computer Systems"},{"journal-title":"Script used to enable monitor mode on wireless interfaces","year":"0","key":"2"},{"year":"0","key":"1"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/IWCMC.2008.103"},{"key":"7","article-title":"Monitoring and measurement in ip networks","author":"beben","year":"2005","journal-title":"Polish Warsaw"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/4236.935180"},{"journal-title":"Scapy Interactive packet manipulation program Biondi P","year":"0","key":"5"},{"journal-title":"Madwifi Linux Kernel Drivers for Wireless lan Devices with Atheros Chipsets","article-title":"Madwifi","year":"0","key":"4"},{"key":"9","first-page":"20","article-title":"Intrusion detection systems for wireless wi-fi networks","author":"cabaj","year":"2004","journal-title":"Polish Secure 2004-VIII IT Conference Warsaw"},{"key":"8","first-page":"115","article-title":"Private wars in networks: Give up, dig in, negotiate or fight","author":"brzezinski","year":"2005","journal-title":"Polish in Bem D et al Internet 2005 Oficyna Wydawnicza Politechniki Wroclawskiej"}],"event":{"name":"2013 5th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT)","start":{"date-parts":[[2013,9,10]]},"location":"Almaty, Kazakhstan","end":{"date-parts":[[2013,9,13]]}},"container-title":["2013 5th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6784145\/6798392\/06798398.pdf?arnumber=6798398","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,23]],"date-time":"2017-03-23T16:45:43Z","timestamp":1490287543000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6798398\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,9]]},"references-count":21,"URL":"https:\/\/doi.org\/10.1109\/icumt.2013.6798398","relation":{},"subject":[],"published":{"date-parts":[[2013,9]]}}}