-
1
-
-
0015672289
-
A note on the confinement problem
-
Oct.
-
B. W. Lampson, "A note on the confinement problem," Commun. ACM, vol. 16, no. 10, pp. 613-615, Oct. 1973.
-
(1973)
Commun. ACM
, vol.16
, Issue.10
, pp. 613-615
-
-
Lampson, B.W.1
-
2
-
-
0023294988
-
Covert channels in LAN's
-
feb.
-
C. Girling, "Covert channels in LAN's," Software Engineering, IEEE Transactions on, vol. SE-13, no. 2, pp. 292-296, feb. 1987.
-
(1987)
Software Engineering, IEEE Transactions on
, vol.SE-13
, Issue.2
, pp. 292-296
-
-
Girling, C.1
-
3
-
-
44449087948
-
A survey of covert channels and countermeasures in computer network protocols
-
quarter
-
S. Zander, G. Armitage, and P. Branch, "A survey of covert channels and countermeasures in computer network protocols," Communications Surveys Tutorials, IEEE, vol. 9, no. 3, pp. 44-57, quarter 2007.
-
(2007)
Communications Surveys Tutorials, IEEE
, vol.9
, Issue.3
, pp. 44-57
-
-
Zander, S.1
Armitage, G.2
Branch, P.3
-
6
-
-
85184292986
-
Stateless model for the prevention of malicious tunnels
-
A. Singh, A. L. M. Santos, O. Nordstrom, and C. Lu, "Stateless model for the prevention of malicious tunnels," in International Journal of Computer and Applications, vol. 28, no. 3, 2006.
-
(2006)
International Journal of Computer and Applications
, vol.28
, Issue.3
-
-
Singh, A.1
Santos, A.L.M.2
Nordstrom, O.3
Lu, C.4
-
7
-
-
53349127055
-
-
Aug, tech. Rep. ESD-TR-78-158, Mitre Corporation
-
M. A. Padlipsky, D. W. Snow, and P. A. Karger, "Limitations of eNDTo-end encryption in secure computer networks," Aug 1978, tech. Rep. ESD-TR-78-158, Mitre Corporation.
-
(1978)
Limitations of ENDTo-end Encryption in Secure Computer Networks
-
-
Padlipsky, M.A.1
Snow, D.W.2
Karger, P.A.3
-
8
-
-
0023294988
-
Covert channels in LAN's
-
Feb
-
C. G. Girling, "Covert channels in LAN's," in IEEE Transaction on Software Engineering, vol. SE-13, no. 2, Feb 1987, pp. 292-296.
-
(1987)
IEEE Transaction on Software Engineering
, vol.SE-13
, Issue.2
, pp. 292-296
-
-
Girling, C.G.1
-
9
-
-
14844330726
-
IP covert timing channels: Design and detection
-
Oct
-
S. Cabuk, C. E. Brodley, and C. Shields, "IP covert timing channels: Design and detection," in 11th ACM Conference on Computer and Communications Security (CCS), Oct 2004, pp. 178-187.
-
(2004)
11th ACM Conference on Computer and Communications Security (CCS)
, pp. 178-187
-
-
Cabuk, S.1
Brodley, C.E.2
Shields, C.3
-
10
-
-
34548319693
-
Experimental assessment of the backoff behavior of commercial ieee 802. 11b network cards
-
may
-
G. Bianchi, A. Di Stefano, C. Giaconia, L. Scalia, G. Terrazzino, and I. Tinnirello, "Experimental assessment of the backoff behavior of commercial ieee 802. 11b network cards," in INFOCOM 2007. 26th IEEE International Conference on Computer Communications. IEEE, may 2007, pp. 1181-1189.
-
(2007)
INFOCOM 2007. 26th IEEE International Conference on Computer Communications. IEEE
, pp. 1181-1189
-
-
Bianchi, G.1
Di Stefano, A.2
Giaconia, C.3
Scalia, L.4
Terrazzino, G.5
Tinnirello, I.6
-
13
-
-
34548355102
-
Mutual anonumous communications: A new covert channel based on splitting tree MAC
-
Z. Wang, J. Deng, and R. B. Lee, "Mutual anonumous communications: A new covert channel based on splitting tree MAC," in INFOCOM 2007, 26th IEEE International Conference on Computer Communication, 2007, pp. 2531-2535.
-
(2007)
INFOCOM 2007, 26th IEEE International Conference on Computer Communication
, pp. 2531-2535
-
-
Wang, Z.1
Deng, J.2
Lee, R.B.3
-
14
-
-
0001217738
-
The prisoners' problem and the subliminal channel
-
"The prisoners' problem and the subliminal channel. " in Advances in Cryptology: Proceedings of CRYPTO '83, 1983, pp. 51-67.
-
(1983)
Advances in Cryptology: Proceedings of CRYPTO '83
, pp. 51-67
-
-
-
15
-
-
84955603568
-
Hiding data in the OSI network model
-
R. Anderson, Ed. Springer Berlin / Heidelberg
-
T. Handel and M. Sandford, "Hiding data in the OSI network model," in Information Hiding, ser. Lecture Notes in Computer Science, R. Anderson, Ed. Springer Berlin / Heidelberg, 1996, vol. 1174, pp. 23-38.
-
(1996)
Information Hiding, Ser. Lecture Notes in Computer Science
, vol.1174
, pp. 23-38
-
-
Handel, T.1
Sandford, M.2
-
17
-
-
4544324338
-
DOMINO: A system to detect greedy behavior in IEEE 802. 11 hotspots
-
jun
-
M. Raya, J.-P. Hubaux, and I. Aad, "DOMINO: A system to detect greedy behavior in IEEE 802. 11 hotspots," in 2nd International Conference on Mobile Systems, Applications, and Services, jun 2004, pp. 84-97.
-
(2004)
2nd International Conference on Mobile Systems, Applications, and Services
, pp. 84-97
-
-
Raya, M.1
Hubaux, J.-P.2
Aad, I.3
-
18
-
-
85184296402
-
-
Http://madwifi-project. org/svn/madwifi/trunk.
-
-
-
-
20
-
-
85184299879
-
-
Http://madwifi-project. org/wiki/ChipsetFeatures/SuperAG.
-
-
-
|