-
3
-
-
55349149383
-
Communication through jamming over a slotted ALOHA channel
-
S. Bhadra, S. Bodas, S. Shakkottai, and S. Vishwanath Communication through jamming over a slotted ALOHA channel IEEE Transactions on Information Theory 54 11 2008 5257 5262
-
(2008)
IEEE Transactions on Information Theory
, vol.54
, Issue.11
, pp. 5257-5262
-
-
Bhadra, S.1
Bodas, S.2
Shakkottai, S.3
Vishwanath, S.4
-
12
-
-
0036715113
-
An information-theoretic and game-theoretic study of timing channels
-
J. Giles, and B. Hajek An information-theoretic and game-theoretic study of timing channels IEEE Transaction on Information Theory 48 9 2002 2455 2477
-
(2002)
IEEE Transaction on Information Theory
, vol.48
, Issue.9
, pp. 2455-2477
-
-
Giles, J.1
Hajek, B.2
-
14
-
-
85084160972
-
Network intrusion detection: Evasion, traffic normalization, and end-to-end protocol semantics
-
Aug. 2001
-
Handley M, Paxson V. Network intrusion detection: evasion, traffic normalization, and end-to-end protocol semantics. In: Proceedings of the 10th USENIX security symposium; Aug. 2001.
-
Proceedings of the 10th USENIX Security Symposium
-
-
Handley, M.1
Paxson, V.2
-
15
-
-
0015672289
-
A note on the confinement problem
-
B.W. Lampson A note on the confinement problem Communications of the ACM 16 10 1973 613 615
-
(1973)
Communications of the ACM
, vol.16
, Issue.10
, pp. 613-615
-
-
Lampson, B.W.1
-
17
-
-
0035481849
-
Jitter-based delay-boundary prediction of wide area networks
-
Q. Li, and D.L. Millis Jitter-based delay-boundary prediction of wide area networks IEEE Trans. on Networking 9 5 2001 578 590
-
(2001)
IEEE Trans. on Networking
, vol.9
, Issue.5
, pp. 578-590
-
-
Li, Q.1
Millis, D.L.2
-
19
-
-
0036329257
-
Steganographic method for secure communications
-
D. Lou, and J. Liu Steganographic method for secure communications Computers and Security 21 5 2002 449 460
-
(2002)
Computers and Security
, vol.21
, Issue.5
, pp. 449-460
-
-
Lou, D.1
Liu, J.2
-
21
-
-
77955414848
-
Covert channel forensics on the Internet: Issues, approaches, and experiences
-
A. Patel, M. Shah, R. Chandramouli, and K.P. Subbalakshm Covert channel forensics on the Internet: issues, approaches, and experiences International Journal of Network Security 5 1 2007 41 50
-
(2007)
International Journal of Network Security
, vol.5
, Issue.1
, pp. 41-50
-
-
Patel, A.1
Shah, M.2
Chandramouli, R.3
Subbalakshm, K.P.4
-
24
-
-
77955423170
-
Eraser: An exploit-specific monitor to prevent malicious communication channel
-
GIT-CERCS-04-28
-
Singh A. Eraser: an exploit-specific monitor to prevent malicious communication channel. Technical report in Georgia Institute of Technology, GIT-CERCS-04-28; 2004.
-
(2004)
Technical Report in Georgia Institute of Technology
-
-
Singh, A.1
-
25
-
-
35248869596
-
Support vector machine based ICMP covert channel attack detection
-
Sohn T, Noh T, Moon J. Support vector machine based ICMP covert channel attack detection. In: Proceedings of 2nd international workshop on mathematical methods, models, and architectures for computer networks; 2003a. p. 461-4.
-
(2003)
Proceedings of 2nd International Workshop on Mathematical Methods, Models, and Architectures for Computer Networks
, pp. 461-464
-
-
Sohn, T.1
Noh, T.2
Moon, J.3
-
27
-
-
77955421239
-
-
Trusted Computer Systems Evaluation Criteria (TCSEC). Department of Defense Standard, CSC-STD-001-83; 1983
-
Trusted Computer Systems Evaluation Criteria (TCSEC). Department of Defense Standard, CSC-STD-001-83; 1983.
-
-
-
-
30
-
-
71849083789
-
A study of on/off timing channel based on packet delay distribution
-
L. Yao, X. Zi, L. Pan, and J. Li A study of on/off timing channel based on packet delay distribution Computers and Security 28 8 2009 785 794
-
(2009)
Computers and Security
, vol.28
, Issue.8
, pp. 785-794
-
-
Yao, L.1
Zi, X.2
Pan, L.3
Li, J.4
-
31
-
-
44449087948
-
A survey of covert channels and countermeasure in computer network protocols
-
S. Zander, G. Armitage, and P. Branch A survey of covert channels and countermeasure in computer network protocols IEEE Communications Survey and Tutorials 9 3 2007 44 57
-
(2007)
IEEE Communications Survey and Tutorials
, vol.9
, Issue.3
, pp. 44-57
-
-
Zander, S.1
Armitage, G.2
Branch, P.3
|