{"id":"https://openalex.org/W4416997958","doi":"https://doi.org/10.3390/computers14120533","title":"Towards a Framework for Covert Communications for Mitigating Traffic Detection Attacks","display_name":"Towards a Framework for Covert Communications for Mitigating Traffic Detection Attacks","publication_year":2025,"publication_date":"2025-12-04","ids":{"openalex":"https://openalex.org/W4416997958","doi":"https://doi.org/10.3390/computers14120533"},"language":"en","primary_location":{"id":"doi:10.3390/computers14120533","is_oa":true,"landing_page_url":"https://doi.org/10.3390/computers14120533","pdf_url":null,"source":{"id":"https://openalex.org/S4210228075","display_name":"Computers","issn_l":"2073-431X","issn":["2073-431X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Computers","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://doi.org/10.3390/computers14120533","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5008009973","display_name":"Abdallah Farraj","orcid":"https://orcid.org/0000-0002-0068-6773"},"institutions":[{"id":"https://openalex.org/I94734805","display_name":"Bryan College","ror":"https://ror.org/01bgnmj50","country_code":"US","type":"education","lineage":["https://openalex.org/I94734805"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Abdallah Farraj","raw_affiliation_strings":["Department of Electrical Engineering, Texas A&M\u2013RELLIS, Bryan, TX 77807, USA"],"affiliations":[{"raw_affiliation_string":"Department of Electrical Engineering, Texas A&M\u2013RELLIS, Bryan, TX 77807, USA","institution_ids":["https://openalex.org/I94734805"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5008009973"],"corresponding_institution_ids":["https://openalex.org/I94734805"],"apc_list":{"value":1600,"currency":"CHF","value_usd":1732},"apc_paid":{"value":1600,"currency":"CHF","value_usd":1732},"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.21425848,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"14","issue":"12","first_page":"533","last_page":"533"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.7646999955177307,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.7646999955177307,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.08179999887943268,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":0.03530000150203705,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/covert","display_name":"Covert","score":0.6754999756813049},{"id":"https://openalex.org/keywords/internet-of-things","display_name":"Internet of Things","score":0.6309000253677368},{"id":"https://openalex.org/keywords/wireless","display_name":"Wireless","score":0.46619999408721924},{"id":"https://openalex.org/keywords/scalability","display_name":"Scalability","score":0.45419999957084656},{"id":"https://openalex.org/keywords/covert-channel","display_name":"Covert channel","score":0.41269999742507935},{"id":"https://openalex.org/keywords/transmission","display_name":"Transmission (telecommunications)","score":0.38760000467300415}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.718999981880188},{"id":"https://openalex.org/C2779338814","wikidata":"https://www.wikidata.org/wiki/Q5179285","display_name":"Covert","level":2,"score":0.6754999756813049},{"id":"https://openalex.org/C81860439","wikidata":"https://www.wikidata.org/wiki/Q251212","display_name":"Internet of Things","level":2,"score":0.6309000253677368},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6139000058174133},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.46619999408721924},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.462799996137619},{"id":"https://openalex.org/C48044578","wikidata":"https://www.wikidata.org/wiki/Q727490","display_name":"Scalability","level":2,"score":0.45419999957084656},{"id":"https://openalex.org/C29024540","wikidata":"https://www.wikidata.org/wiki/Q1476964","display_name":"Covert channel","level":5,"score":0.41269999742507935},{"id":"https://openalex.org/C761482","wikidata":"https://www.wikidata.org/wiki/Q118093","display_name":"Transmission (telecommunications)","level":2,"score":0.38760000467300415},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.27970001101493835},{"id":"https://openalex.org/C101765175","wikidata":"https://www.wikidata.org/wiki/Q577764","display_name":"Communications system","level":2,"score":0.26899999380111694},{"id":"https://openalex.org/C2778464652","wikidata":"https://www.wikidata.org/wiki/Q309849","display_name":"Open research","level":2,"score":0.2563999891281128},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.25270000100135803}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.3390/computers14120533","is_oa":true,"landing_page_url":"https://doi.org/10.3390/computers14120533","pdf_url":null,"source":{"id":"https://openalex.org/S4210228075","display_name":"Computers","issn_l":"2073-431X","issn":["2073-431X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Computers","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:7d1f803ad0c04b5caa8e1eb33f1f989c","is_oa":true,"landing_page_url":"https://doaj.org/article/7d1f803ad0c04b5caa8e1eb33f1f989c","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Computers, Vol 14, Iss 12, p 533 (2025)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.3390/computers14120533","is_oa":true,"landing_page_url":"https://doi.org/10.3390/computers14120533","pdf_url":null,"source":{"id":"https://openalex.org/S4210228075","display_name":"Computers","issn_l":"2073-431X","issn":["2073-431X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Computers","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":36,"referenced_works":["https://openalex.org/W581334404","https://openalex.org/W1565176535","https://openalex.org/W2006740091","https://openalex.org/W2007529001","https://openalex.org/W2133199053","https://openalex.org/W2146761479","https://openalex.org/W2566769952","https://openalex.org/W2756790867","https://openalex.org/W2808001923","https://openalex.org/W2896420513","https://openalex.org/W2903294440","https://openalex.org/W2906954590","https://openalex.org/W2933656887","https://openalex.org/W2963381616","https://openalex.org/W2963655955","https://openalex.org/W2975208138","https://openalex.org/W4213191624","https://openalex.org/W4308323115","https://openalex.org/W4361828775","https://openalex.org/W4361828801","https://openalex.org/W4362500847","https://openalex.org/W4377079787","https://openalex.org/W4384787835","https://openalex.org/W4391992316","https://openalex.org/W4392940040","https://openalex.org/W4393033138","https://openalex.org/W4393185127","https://openalex.org/W4399602461","https://openalex.org/W4400032886","https://openalex.org/W4401512286","https://openalex.org/W4404247531","https://openalex.org/W4405484624","https://openalex.org/W4405809404","https://openalex.org/W4405832032","https://openalex.org/W4406858301","https://openalex.org/W4408323550"],"related_works":[],"abstract_inverted_index":{"This":[0],"article":[1,114],"addresses":[2],"a":[3,31,99],"critical":[4],"security":[5,40,52,96,130],"challenge":[6],"in":[7,68,112,118],"Internet":[8],"of":[9,41,50,75,84,133],"Things":[10],"(IoT)":[11],"systems,":[12],"which":[13,125],"are":[14],"vulnerable":[15],"to":[16,21,37,71,127],"traffic":[17,122],"detection":[18,123],"attacks":[19,46],"due":[20],"their":[22],"reliance":[23],"on":[24],"shared":[25],"wireless":[26],"communication":[27,82,92],"channels.":[28],"We":[29],"propose":[30],"novel":[32],"cooperative":[33],"covert":[34,91],"transmission":[35],"strategy":[36,93],"enhance":[38],"the":[39,48,59,69,73,81,85,128],"IoT":[42,66,87,107,134],"communications":[43,120],"against":[44,121],"these":[45],"through":[47],"implementation":[49],"physical-layer":[51],"mechanisms.":[53],"Inspired":[54],"by":[55],"zero-forcing":[56],"precoding":[57],"techniques,":[58],"proposed":[60,90],"approach":[61],"enables":[62],"cooperation":[63],"between":[64],"different":[65],"devices":[67],"system":[70],"increase":[72],"likelihood":[74],"adversaries":[76],"making":[77],"incorrect":[78],"conclusions":[79],"about":[80],"activity":[83],"targeted":[86],"device.":[88],"The":[89,109],"complements":[94],"traditional":[95],"measures,":[97],"provides":[98],"scalable":[100],"solution,":[101],"and":[102,131],"is":[103],"suitable":[104],"for":[105],"resource-constrained":[106],"environments.":[108],"numerical":[110],"results":[111],"this":[113],"demonstrate":[115],"significant":[116],"improvements":[117],"protecting":[119],"attacks,":[124],"contributes":[126],"overall":[129],"privacy":[132],"systems.":[135]},"counts_by_year":[],"updated_date":"2026-03-07T16:01:11.037858","created_date":"2025-12-04T00:00:00"}
