Methods of hiding data in computer networks: from classics to IoT and Ai

dc.contributor.authorShelest, Mykhailo
dc.contributor.authorPidlisnyi, Yurii
dc.contributor.authorKapustian, Mariia
dc.date.accessioned2026-01-23T12:12:42Z
dc.date.available2026-01-23T12:12:42Z
dc.date.issued2025
dc.description.abstractThe article presents an overview of key methods in network steganography, including the classification of data hiding techniques in network protocols and discussion of promising directions for further research. Special attention is paid to the use of steganography in modern network environments such as IoT, as well as the application of artificial intelligence to traffic masking. The paper also outlines current approaches to hidden channel detection and threat modeling in digital communication systems.
dc.identifier.citationShelest M. Methods of hiding data in computer networks: from classics to IoT and Ai / M. Shelest, Y. Pidlisnyi, M. Kapustian // Computer Systems and Information Technologies. – 2025. – № 4. – P. 27-34.
dc.identifier.urihttps://elar.khmnu.edu.ua/handle/123456789/20507
dc.language.isoen
dc.publisherХмельницький національний університет
dc.subjectnetwork steganography
dc.subjectcovert channels
dc.subjectIoT
dc.subjecttransmission protocols
dc.subjectcybersecurity
dc.subjectsteganalysis
dc.subjectinformation security
dc.subject.udc004.681.3
dc.titleMethods of hiding data in computer networks: from classics to IoT and Ai
dc.typeСтаття
Файли
Контейнер файлів
Зараз показуємо 1 - 1 з 1
Назва:
CSIT-2025-N4+(21)+27-34 (1).pdf
Розмір:
1.03 MB
Формат:
Adobe Portable Document Format
Ліцензійна угода
Зараз показуємо 1 - 1 з 1
Назва:
license.txt
Розмір:
4.26 KB
Формат:
Item-specific license agreed upon to submission
Опис:
Зібрання