Author:
Sun Quan,Chen Yonghong,Wang Tian
Publisher
Springer International Publishing
Reference18 articles.
1. Cabuk, S.: Network covert channels: design, analysis, detection, and elimination. ETD Collection for Purdue University (2006)
2. Girling, C.G.: Covert channels in LAN’s. IEEE Trans. Softw. Eng. 13(2), 292–296 (1987)
3. Cabuk, S., Brodley, C.E., Shields, C.: IP covert channel detection. ACM Trans. Inf. Syst. Secur. 12(4), 1–29 (2009)
4. Peng, P., Ning, P., Reeves, D.S.: On the secrecy of timing-based active watermarking trace-back techniques. In: IEEE Symposium on Security and Privacy (S&P), vol. 15 (2006)
5. Gianvecchio, S., Wang, H.: An entropy-based approach to detecting covert timing channels. IEEE Trans. Dependable Secure Comput. 8(6), 785–797 (2011)