Network steganalysis: Detection of steganography in IEEE 802.11 wireless networks.
Szymon GrabskiKrzysztof SzczypiorskiPublished in: ICUMT (2013)
Keyphrases
- wireless networks
- link layer
- access points
- cellular networks
- medium access control
- wireless local area network
- wireless lan
- mobile wireless
- mobile networks
- network coding
- wireless communication
- video delivery
- wireless local area networks
- wired networks
- mobile nodes
- mac layer
- ad hoc networks
- cross layer
- network access
- wifi
- wireless ad hoc networks
- wireless mesh networks
- wireless technologies
- network infrastructure
- data hiding
- network simulator
- mac protocol
- heterogeneous wireless networks
- cognitive radio
- jpeg images
- base station
- multimedia services
- wireless access
- mobility management
- information hiding
- power control
- communication networks
- peer to peer
- network traffic
- computer networks
- multi hop
- access network
- channel assignment
- traffic load
- routing protocol
- anomaly detection
- physical layer