A survey on big data market: Pricing, trading and protection

F Liang, W Yu, D An, Q Yang, X Fu, W Zhao - Ieee Access, 2018 - ieeexplore.ieee.org
Big data is considered to be the key to unlocking the next great waves of growth in
productivity. The amount of collected data in our world has been exploding due to a number …

VoIP steganography and its detection—a survey

W Mazurczyk - ACM Computing Surveys (CSUR), 2013 - dl.acm.org
Steganography is an ancient art that encompasses various techniques of information hiding,
the aim of which is to embed secret information into a carrier message. Steganographic …

Network flow watermarking: A survey

A Iacovazzi, Y Elovici - IEEE Communications Surveys & …, 2016 - ieeexplore.ieee.org
Traffic analysis (TA) is a useful tool aimed at understanding network traffic behavior. Basic
network administration often takes advantage of TA for purposes such as security, intrusion …

Privacy-preserving auction for big data trading using homomorphic encryption

W Gao, W Yu, F Liang, WG Hatcher… - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
Cyber-Physical Systems (smart grid, smart transportation, smart cities, etc.), driven by
advances in Internet of Things (IoT) technologies, will provide the infrastructure and …

A survey of the dark web and dark market research

H Zhang, F Zou - 2020 IEEE 6th international conference on …, 2020 - ieeexplore.ieee.org
The Dark Web is a web-based content based on anonymous communication systems that
protects users and protects anonymity through technologies such as traffic encryption …

How to find hidden users: A survey of attacks on anonymity networks

E Erdin, C Zachor, MH Gunes - IEEE Communications Surveys …, 2015 - ieeexplore.ieee.org
Communication privacy has been a growing concern, particularly with the Internet becoming
a major hub of our daily interactions. Revelations of government tracking and corporate …

A payload-dependent packet rearranging covert channel for mobile VoIP traffic

C Liang, X Wang, X Zhang, Y Zhang, K Sharif, Y Tan - Information Sciences, 2018 - Elsevier
Abstract VoIP (Voice over Internet Protocol) is one of the most prevalent services for the
mobile users. An enormous amount of audio and video data is transmitted over VoIP …

Systematic literature review on the state of the art and future research work in anonymous communications systems

MA Nia, A Ruiz-Martinez - Computers & electrical engineering, 2018 - Elsevier
Privacy is an important research topic due to its implications in society. Among the topics
covered by privacy, we can highlight how to establish anonymous communications. During …

Digital watermarking for detecting malicious intellectual property cores in noc architectures

S Charles, V Bindschaedler… - IEEE Transactions on Very …, 2022 - ieeexplore.ieee.org
System-on-chip (SoC) developers utilize intellectual property (IP) cores from third-party
vendors due to increasing design complexity, cost, as well as time-to-market constraints. A …

Towards a reliable detection of covert timing channels over real-time network traffic

F Rezaei, M Hempel, H Sharif - IEEE Transactions on …, 2017 - ieeexplore.ieee.org
Inter-packet delays (IPD) of legitimate network traffic can be exploited for information hiding
purposes and distribution of secret and sensitive data. This process is known as Covert …