Covert channels in TCP/IP protocol stack-extended version A Mileva, B Panajotov Open Computer Science 4 (2), 45-66, 2014 | 96 | 2014 |
Running and testing applications for Contiki OS using Cooja simulator A Velinov, A Mileva International conference on information technology and development of …, 2016 | 87 | 2016 |
Covert channels in the MQTT-based Internet of Things A Velinov, A Mileva, S Wendzel, W Mazurczyk IEEE Access 7, 161899-161915, 2019 | 53 | 2019 |
Comprehensive analysis of MQTT 5.0 susceptibility to network covert channels A Mileva, A Velinov, L Hartmann, S Wendzel, W Mazurczyk Computers & security 104, 102207, 2021 | 51 | 2021 |
A revised taxonomy of steganography embedding patterns S Wendzel, L Caviglione, W Mazurczyk, A Mileva, J Dittmann, C Krätzer, ... Proceedings of the 16th international conference on availability …, 2021 | 47 | 2021 |
Evaluation and testing of several free/open source web vulnerability scanners N Suteva, D Zlatkovski, A Mileva Faculty of Computer Science and Engineering, Ss. Cyril and Methodius …, 2013 | 37 | 2013 |
Generating huge quasigroups from small non-linear bijections via extended Feistel function S Markovski, A Mileva Quasigroups and related systems 17 (1), 91-106, 2009 | 29 | 2009 |
New covert channels in Internet of Things A Mileva, A Velinov, D Stojanov 12th International Conference on Emerging Security Information, Systems and …, 2018 | 26 | 2018 |
A new property coding in text steganography of Microsoft Word documents I Stojanov, A Mileva, I Stojanovic The Eighth International Conference on Emerging Security Information …, 2014 | 25 | 2014 |
Analysis of the authenticated cipher MORUS (v1) A Mileva, V Dimitrova, V Velichkov International Conference on Cryptography and Information Security in the …, 2015 | 24 | 2015 |
Shapeless quasigroups derived by Feistel orthomorphisms A Mileva, S Markovski Glasnik matematički 47 (2), 333-349, 2012 | 22 | 2012 |
Introducing dead drops to network steganography using ARP-caches and SNMP-walks T Schmidbauer, S Wendzel, A Mileva, W Mazurczyk Proceedings of the 14th International Conference on Availability …, 2019 | 19 | 2019 |
Quasigroup representation of some Feistel and generalized Feistel ciphers A Mileva, S Markovski International Conference on ICT Innovations, 161-171, 2012 | 18 | 2012 |
Steganography of hypertext transfer protocol version 2 (http/2) B Dimitrova, A Mileva Journal of Computer and Communications 5 (05), 98, 2017 | 17 | 2017 |
A new, space-efficient local pairwise alignment methodology D Stojanov, A Mileva, S Koceski Advanced Studies in Biology 4 (2), 85-93, 2012 | 15 | 2012 |
Power consumption analysis of the new covert channels in coap A Velinov, A Mileva, D Stojanov Int. J. Adv. Secur 12 (1), 42-52, 2019 | 13 | 2019 |
Covert channels in TCP/IP protocol stack B Panajotov, A Mileva ICT innovations web proceedings, 190-199, 2013 | 12 | 2013 |
Catalog and illustrative examples of lightweight cryptographic primitives A Mileva, V Dimitrova, O Kara, MJ Mihaljević Security of ubiquitous computing systems: selected topics, 21-47, 2021 | 11 | 2021 |
Computer forensic analisys of some web attacks N Šuteva, A Mileva, M Loleski World congress on internet security (WorldCIS-2014), 42-47, 2014 | 11 | 2014 |
Cryptographic primitives with quasigroup transformations A Mileva Mathematica Balkanica, 207, 2010 | 11 | 2010 |