Covert channels in TCP/IP protocol stack-extended version A Mileva, B Panajotov Open Computer Science 4 (2), 45-66, 2014 | 97 | 2014 |
Running and testing applications for Contiki OS using Cooja simulator A Velinov, A Mileva | 81 | 2016 |
Covert channels in the MQTT-based Internet of Things A Velinov, A Mileva, S Wendzel, W Mazurczyk IEEE Access 7, 161899-161915, 2019 | 48 | 2019 |
Comprehensive analysis of MQTT 5.0 susceptibility to network covert channels A Mileva, A Velinov, L Hartmann, S Wendzel, W Mazurczyk Computers & security 104, 102207, 2021 | 46 | 2021 |
A revised taxonomy of steganography embedding patterns S Wendzel, L Caviglione, W Mazurczyk, A Mileva, J Dittmann, C Krätzer, ... Proceedings of the 16th international conference on availability …, 2021 | 44 | 2021 |
Evaluation and testing of several free/open source web vulnerability scanners N Suteva, D Zlatkovski, A Mileva | 35 | 2013 |
Generating huge quasigroups from small non-linear bijections via extended Feistel function S Markovski, A Mileva Quasigroups and related systems 17 (1), 91-106, 2009 | 31 | 2009 |
Analysis of the authenticated cipher MORUS (v1) A Mileva, V Dimitrova, V Velichkov International Conference on Cryptography and Information Security in the …, 2015 | 25 | 2015 |
A new property coding in text steganography of Microsoft Word documents I Stojanov, A Mileva, I Stojanovic | 24 | 2014 |
Shapeless quasigroups derived by Feistel orthomorphisms A Mileva, S Markovski Glasnik matematički 47 (2), 333-349, 2012 | 22 | 2012 |
New covert channels in Internet of Things A Mileva, A Velinov, D Stojanov | 21 | 2018 |
A new, space-efficient local pairwise alignment methodology D Stojanov, A Mileva, S Koceski Advanced Studies in Biology 4 (2), 85-93, 2012 | 19 | 2012 |
Quasigroup representation of some Feistel and generalized Feistel ciphers A Mileva, S Markovski International Conference on ICT Innovations, 161-171, 2012 | 18 | 2012 |
Introducing dead drops to network steganography using ARP-caches and SNMP-walks T Schmidbauer, S Wendzel, A Mileva, W Mazurczyk Proceedings of the 14th International Conference on Availability …, 2019 | 17 | 2019 |
Power consumption analysis of the new covert channels in coap A Velinov, A Mileva, D Stojanov International Journal On Advances in Security 12 (1 & 2), 42-52, 2019 | 14 | 2019 |
Steganography of hypertext transfer protocol version 2 (http/2) B Dimitrova, A Mileva Journal of Computer and Communications 5, 98-111, 2017 | 14 | 2017 |
Covert channels in TCP/IP protocol stack B Panajotov, A Mileva ICT innovations web proceedings, 190-199, 2013 | 13 | 2013 |
Catalog and illustrative examples of lightweight cryptographic primitives A Mileva, V Dimitrova, O Kara, MJ Mihaljević Security of ubiquitous computing systems: selected topics, 21-47, 2021 | 11 | 2021 |
Computer forensic analisys of some web attacks N Šuteva, A Mileva, M Loleski World Congress on Internet Security (WorldCIS-2014), 42-47, 2014 | 11 | 2014 |
Cryptographic primitives with quasigroup transformations A Mileva Faculty of Natural Science, University" Ss Cyril and Methodius", 2010 | 10 | 2010 |