Network steganography using the overflow field of timestamp option in an IPv4 packet P Bedi, A Dua Procedia Computer Science 171, 1810-1818, 2020 | 34 | 2020 |
Network steganography using extension headers in IPv6 P Bedi, A Dua International Conference on Information, Communication and Computing …, 2020 | 13 | 2020 |
Covert communication using address resolution protocol broadcast request messages A Dua, V Jindal, P Bedi 2021 9th International Conference on Reliability, Infocom Technologies and …, 2021 | 9 | 2021 |
ARPNetSteg: Network steganography using address resolution protocol P Bedi, A Dua International Journal of Electronics and Telecommunications 66, 2020 | 8 | 2020 |
DICCh-D: detecting IPv6-based covert channels using DNN A Dua, V Jindal, P Bedi International Conference on Information, Communication and Computing …, 2022 | 4 | 2022 |
Identifying forged images using image metadata P Bedi, A Mittal, M Gangwar, A Dua Proceedings of ICETIT 2019: Emerging Trends in Information Technology, 1071-1081, 2020 | 4 | 2020 |
Detecting and locating storage-based covert channels in internet protocol version 6 A Dua, V Jindal, P Bedi IEEE Access 10, 110661-110675, 2022 | 3 | 2022 |
FIHIM: a framework for information hiding in IPv6 using micro-protocols P Bedi, A Dua, V Jindal International Journal of Information Technology, 1-20, 2023 | 1 | 2023 |
SPYIPv6: Locating covert data in one or a combination of IPv6 header field (s) P Bedi, V Jindal, A Dua IEEE Access, 2023 | 1 | 2023 |