-
3
-
-
0013057164
-
Analysis of end-to-end delay measurements in Internet
-
Bovy C, Mertodimedjo H, Hooghiemstra G, Uijterwaal H, Mieghem P. Analysis of end-to-end delay measurements in Internet. In: Proc. of PAM; 2002. pp. 26-33.
-
(2002)
Proc. of PAM
, pp. 26-33
-
-
Bovy, C.1
Mertodimedjo, H.2
Hooghiemstra, G.3
Uijterwaal, H.4
Mieghem, P.5
-
4
-
-
14844330726
-
IP covert timing channels: Design and detection
-
Cabuk S, Brodley C, Shields C. IP covert timing channels: design and detection. In: Proc. of ACM CCS; 2004. pp. 178-87.
-
(2004)
Proc. of ACM CCS
, pp. 178-187
-
-
Cabuk, S.1
Brodley, C.2
Shields, C.3
-
5
-
-
71849090630
-
-
Cabuk S. Network covert channels: design, analysis, detection, and elimination. Thesis for Ph.D degree: Purdue University; 2006.
-
Cabuk S. Network covert channels: design, analysis, detection, and elimination. Thesis for Ph.D degree: Purdue University; 2006.
-
-
-
-
6
-
-
71849109680
-
Steganographic communication in ordered channels
-
Chakinala RC, Kumarasubramanian A, Manokaran R, Noubir G, Pandu Rangan C, Sundaram R. Steganographic communication in ordered channels. In: Proc. of information hiding; 2006. pp. 42-57.
-
(2006)
Proc. of information hiding
, pp. 42-57
-
-
Chakinala, R.C.1
Kumarasubramanian, A.2
Manokaran, R.3
Noubir, G.4
Pandu Rangan, C.5
Sundaram, R.6
-
9
-
-
77952331178
-
Detecting covert timing channels: An entropy-based approach
-
pp.
-
Gianvecchio S, Wang H. Detecting covert timing channels: an entropy-based approach. In: Proc. of ACM CCS; 2007. pp. 307-16.
-
(2007)
Proc. of ACM CCS
, pp. 307-316
-
-
Gianvecchio, S.1
Wang, H.2
-
10
-
-
0036715113
-
An information-theoretic and game-theoretic study of timing channels
-
Giles J., and Hajek B. An information-theoretic and game-theoretic study of timing channels. IEEE Transaction on Information Theory 48 9 (2002) 2455-2477
-
(2002)
IEEE Transaction on Information Theory
, vol.48
, Issue.9
, pp. 2455-2477
-
-
Giles, J.1
Hajek, B.2
-
11
-
-
85084160972
-
Network intrusion detection: Evasion, traffic normalization, and end-to-end protocol semantics
-
Aug
-
Handley M, Paxson V. Network intrusion detection: evasion, traffic normalization, and end-to-end protocol semantics. In: Proc. of the 10th USENIX security symposium; Aug. 2001.
-
(2001)
Proc. of the 10th USENIX security symposium
-
-
Handley, M.1
Paxson, V.2
-
12
-
-
34249871943
-
Dual-wrapped digital watermarking scheme for image copyright protection
-
Hu M., Lou D., and Chang M. Dual-wrapped digital watermarking scheme for image copyright protection. Computers & Security 26 4 (2007) 319-330
-
(2007)
Computers & Security
, vol.26
, Issue.4
, pp. 319-330
-
-
Hu, M.1
Lou, D.2
Chang, M.3
-
13
-
-
0035481849
-
Jitter-based delay-boundary prediction of wide area networks
-
Li Q., and Millis D.L. Jitter-based delay-boundary prediction of wide area networks. IEEE/ACM Transactions on Networking 9 5 (2001) 578-590
-
(2001)
IEEE/ACM Transactions on Networking
, vol.9
, Issue.5
, pp. 578-590
-
-
Li, Q.1
Millis, D.L.2
-
14
-
-
0036329257
-
Steganographic method for secure communications
-
Lou D., and Liu J. Steganographic method for secure communications. Computers & Security 21 5 (2002) 449-460
-
(2002)
Computers & Security
, vol.21
, Issue.5
, pp. 449-460
-
-
Lou, D.1
Liu, J.2
-
16
-
-
38049094594
-
-
Luo X, Chan EWW, Chang RKC. Cloak: a ten-fold way for reliable covert communications. ESORICS'07; 2007. pp. 283-98.
-
Luo X, Chan EWW, Chang RKC. Cloak: a ten-fold way for reliable covert communications. ESORICS'07; 2007. pp. 283-98.
-
-
-
-
17
-
-
0028758682
-
On the dynamics and significance of low-frequency components of Internet load
-
Mukherjee A. On the dynamics and significance of low-frequency components of Internet load. Internetworking: Research and Experience 5 4 (1994) 163-205
-
(1994)
Internetworking: Research and Experience
, vol.5
, Issue.4
, pp. 163-205
-
-
Mukherjee, A.1
-
20
-
-
0142183968
-
Covert channel detection in the ICMP payload using support vector machine
-
Sohn T, Moon J, Lee S, Lee DH, Lim J. Covert channel detection in the ICMP payload using support vector machine. In: Proc. of ISCIS; 2003. pp. 828-35.
-
(2003)
Proc. of ISCIS
, pp. 828-835
-
-
Sohn, T.1
Moon, J.2
Lee, S.3
Lee, D.H.4
Lim, J.5
-
22
-
-
50049089585
-
Detecting IP covert timing channels by correlating packet timing with memory content
-
Stillman R.M. Detecting IP covert timing channels by correlating packet timing with memory content. IEEE Southeastcon (2008) 204-209
-
(2008)
IEEE Southeastcon
, pp. 204-209
-
-
Stillman, R.M.1
-
23
-
-
71849102202
-
-
Trusted Computer Systems Evaluation Criteria (TCSEC). Department of Defence Standard, CSC-STD-001-83; 1983.
-
Trusted Computer Systems Evaluation Criteria (TCSEC). Department of Defence Standard, CSC-STD-001-83; 1983.
-
-
-
-
24
-
-
34848819708
-
A novel covert channel based on the IP header record route option
-
Trabelsi Z., Hesham E., Frikha L., and Rabie T. A novel covert channel based on the IP header record route option. International Journal of Advanced Media and Communication 1 4 (2007) 328-350
-
(2007)
International Journal of Advanced Media and Communication
, vol.1
, Issue.4
, pp. 328-350
-
-
Trabelsi, Z.1
Hesham, E.2
Frikha, L.3
Rabie, T.4
|