{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,21]],"date-time":"2025-08-21T18:42:51Z","timestamp":1755801771161,"version":"3.44.0"},"reference-count":23,"publisher":"IEEE","license":[{"start":{"date-parts":[[2019,11,1]],"date-time":"2019-11-01T00:00:00Z","timestamp":1572566400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2019,11,1]],"date-time":"2019-11-01T00:00:00Z","timestamp":1572566400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,11]]},"DOI":"10.1109\/itnac46935.2019.9078009","type":"proceedings-article","created":{"date-parts":[[2020,4,27]],"date-time":"2020-04-27T20:49:26Z","timestamp":1588020566000},"page":"1-6","source":"Crossref","is-referenced-by-count":3,"title":["Steganalysis of Storage-based Covert Channels Using Entropy"],"prefix":"10.1109","author":[{"given":"Jun O","family":"Seo","sequence":"first","affiliation":[{"name":"The University of Auckland,Department of Computer Science,Auckland,New Zealand"}]},{"given":"Sathiamoorthy","family":"Manoharan","sequence":"additional","affiliation":[{"name":"The University of Auckland,Department of Computer Science,Auckland,New Zealand"}]},{"given":"Ulrich","family":"Speidel","sequence":"additional","affiliation":[{"name":"The University of Auckland,Department of Computer Science,Auckland,New Zealand"}]}],"member":"263","reference":[{"key":"ref10","article-title":"Network intrusion detection: Evasion, traffic normalization, and end-to-end protocol semantics","author":"handley","year":"2001","journal-title":"Proceedings of the 10th Conference on USENIX Security Symposium-Volume 10 Ser SSYM'01"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/11767831_10"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2010.46"},{"key":"ref13","article-title":"Representing variable-length codes in fixed-length T-depletion format in encoders and decoders","author":"gunther","year":"1997","journal-title":"Tech Rep"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ICICS.2007.4449642"},{"key":"ref15","first-page":"519","article-title":"Multimedia applications of self-synchronizing T-codes","author":"f","year":"2001","journal-title":"Proceedings Internatinoal Conference on Information Technology Coding and Computing"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/DCC.2010.68"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/PACRIM.2011.6033011"},{"key":"ref18","first-page":"40","article-title":"Complexity-based steganal-ysis","author":"manoharan","year":"2014","journal-title":"2014 International Symposium on Information Theory and its Applications ISITA"},{"journal-title":"Robust Source Coding with Generalised T-codes","year":"1998","author":"g\u00fcnther","key":"ref19"},{"journal-title":"Steganography use on the rise among cyber espionage cybercrime groups","year":"0","author":"vijayan","key":"ref4"},{"journal-title":"Readers of popular websites targeted by stealthy Stegano exploit kit hiding in pixels of malicious ads","year":"0","key":"ref3"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/MINES.2009.227"},{"journal-title":"Bin Laden's messages could be hiding in plain sight","year":"0","author":"maney","key":"ref5"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1002\/9781119081715"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/DASC-PICom-DataCom-CyberSciTec.2016.80"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1002\/9781119081715"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/MINES.2011.97"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1002\/j.1538-7305.1948.tb01338.x"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1976.1055501"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.1998.708931"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/DCC.2000.838175"},{"journal-title":"Lorem ipsum-Wikipedia the free encyclopedia","year":"0","key":"ref23"}],"event":{"name":"2019 29th International Telecommunication Networks and Applications Conference (ITNAC)","start":{"date-parts":[[2019,11,27]]},"location":"Auckland, New Zealand","end":{"date-parts":[[2019,11,29]]}},"container-title":["2019 29th International Telecommunication Networks and Applications Conference (ITNAC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9068186\/9077926\/09078009.pdf?arnumber=9078009","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,20]],"date-time":"2025-08-20T18:39:35Z","timestamp":1755715175000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9078009\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,11]]},"references-count":23,"URL":"https:\/\/doi.org\/10.1109\/itnac46935.2019.9078009","relation":{},"subject":[],"published":{"date-parts":[[2019,11]]}}}