Donnerstag, 12. Dezember 2019

Call for Papers: MDPI Computers, Special Issue on Information Hiding, Steganography and Covert Channels

Special Issue "Information Hiding, Network Steganography, and Covert Channels"

A special issue of Computers (ISSN 2073-431X).
Deadline for manuscript submissions: 30 September 2020.

Special Issue Editors

Dr. Luca Caviglione E-Mail Website
Guest Editor
National Research Council of Italy, Genova, Italy
Interests: Information Hiding; Wireless Networks; Cloud and Networking
Dr. Steffen Wendzel E-Mail Website
Guest Editor
Worms University of Applied Sciences, Worms, Germany
Interests: network information hiding; IoT; networking; information security; data mining; machine learning
Prof. Dr. Wojciech Mazurczyk E-Mail Website
Guest Editor
Fern Universitaet in Hagen, Hagen, Germany
Interests: information hiding; network security; bio-inspired cybersecurity

Special Issue Information

Dear Colleagues,
Information hiding techniques and network covert channels are becoming fundamental to assess the security characteristics of the Internet. On the one hand, they can be used as offensive tools to empower malware, for instance, to bypass security policies of infected nodes, to secretly exfiltrate data towards remote command and control facilities, or to orchestrate a botnet or launch an attack without being detected by de-facto standard security tools. On the other hand, information hiding and network covert channels can be used to enforce copyright of digital artifacts via watermarking, trace network flows for traffic engineering purposes, and implement privacy enhancing services. From this perspective, this Special Issue aims at collecting new work addressing different aspects of information hiding and network covert channels.
Authors are invited to submit original work on (but not limited to) the following topics:
  • Model detection techniques and the mitigation of information hiding-capable threats;
  • Colluding application attacks and exfiltration techniques;
  • New mechanisms to orchestrate botnets and hide data exfiltration;
  • Novel detection techniques for network covert channels, with an emphasis on scalability;
  • Advanced network covert channels, for instance, those leveraging reversible steganographic methods;
  • Information hiding for obfuscation, anti-forensics techniques, and covert data storage;
  • Watermarking of network flows for traffic engineering and security;
  • Privacy enhancing frameworks based on information hiding.
Dr. Luca Caviglione
Dr. Steffen Wendzel
Prof. Dr. Wojciech Mazurczyk
Guest Editors

Keywords

  • Information hiding
  • Network security
  • Steganography
  • Malware obfuscation
  • Covert channels
  • Privacy enhancing technologies

Keine Kommentare:

Kommentar posten