Covert channels in TCP/IP protocol stack-extended version A Mileva, B Panajotov Open Computer Science 4 (2), 45-66, 2014 | 67 | 2014 |
Running and testing applications for Contiki OS using Cooja simulator A Velinov, A Mileva | 49 | 2016 |
Evaluation and testing of several free/open source web vulnerability scanners N Suteva, D Zlatkovski, A Mileva | 27 | 2013 |
Analysis of the authenticated cipher MORUS (v1) A Mileva, V Dimitrova, V Velichkov International Conference on Cryptography and Information Security in the …, 2015 | 22 | 2015 |
Covert channels in the MQTT-based Internet of Things A Velinov, A Mileva, S Wendzel, W Mazurczyk IEEE Access 7, 161899-161915, 2019 | 18 | 2019 |
Generating huge quasigroups from small non-linear bijections via extended Feistel function S Markovski, A Mileva Quasigroups and related systems 17 (1), 91-106, 2009 | 17 | 2009 |
A new property coding in text steganography of Microsoft Word documents I Stojanov, A Mileva, I Stojanovic | 16 | 2014 |
Comprehensive analysis of MQTT 5.0 susceptibility to network covert channels A Mileva, A Velinov, L Hartmann, S Wendzel, W Mazurczyk Computers & security 104, 102207, 2021 | 15 | 2021 |
Shapeless quasigroups derived by Feistel orthomorphisms A Mileva, S Markovski Glasnik matematički 47 (2), 333-349, 2012 | 15 | 2012 |
A new, space-efficient local pairwise alignment methodology D Stojanov, A Mileva, S Koceski Advanced Studies in Biology 4 (2), 85-93, 2012 | 15 | 2012 |
New covert channels in Internet of Things A Mileva, A Velinov, D Stojanov | 14 | 2018 |
Quasigroup representation of some Feistel and generalized Feistel ciphers A Mileva, S Markovski International Conference on ICT Innovations, 161-171, 2012 | 12 | 2012 |
Steganography of hypertext transfer protocol version 2 (http/2) B Dimitrova, A Mileva Journal of Computer and Communications 5, 98-111, 2017 | 11 | 2017 |
Introducing dead drops to network steganography using ARP-caches and SNMP-walks T Schmidbauer, S Wendzel, A Mileva, W Mazurczyk Proceedings of the 14th International Conference on Availability …, 2019 | 10 | 2019 |
Computer forensic analisys of some web attacks N Šuteva, A Mileva, M Loleski World Congress on Internet Security (WorldCIS-2014), 42-47, 2014 | 10 | 2014 |
Covert channels in TCP/IP protocol stack B Panajotov, A Mileva ICT innovations web proceedings, 190-199, 2013 | 9 | 2013 |
Quasigroup string transformations and hash function design A Mileva, S Markovski International Conference on ICT Innovations, 367-376, 2009 | 8 | 2009 |
Power consumption analysis of the new covert channels in coap A Velinov, A Mileva, D Stojanov International Journal On Advances in Security 12 (1 & 2), 42-52, 2019 | 7 | 2019 |
Cryptographic primitives with quasigroup transformations A Mileva Faculty of Natural Science, University" Ss Cyril and Methodius", 2010 | 7 | 2010 |
A new method for computing the number of n-quasigroups S Markovski, V Dimitrova, A Mileva Buletinul Academiei de Stiinte a Republicii Moldova. Matematica 52 (3), 57-64, 2006 | 7 | 2006 |