Author:
Mazurczyk Wojciech,Szczypiorski Krzysztof
Publisher
Springer Science and Business Media LLC
Subject
Electrical and Electronic Engineering
Reference21 articles.
1. Rowland, C. (1997). Covert channels in the TCP/IP protocol suite, first Monday. Peer Reviewed Journal on the Internet, July 1997.
2. Zander, S., Armitage, G., & Branch, P. (2007). A survey of covert channels and countermeasures in computer network protocols. IEEE Communications Surveys & Tutorials, 9(3), 44–57. ISSN: 1553-877X.
3. Petitcolas, F., Anderson, R., & Kuhn, M. (1999). Information hiding—a survey. IEEE Special Issue on Protection of Multimedia Content, July 1999.
4. Murdoch, S. J., & Lewis, S. (2005). Embedding covert channels into TCP/IP. Information Hiding, 247–260.
5. Postel, J. (1981). Internet protocol. IETF RFC 791, September 1981.
Cited by
20 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. A TCP-based covert channel with integrity check and retransmission;International Journal of Information Security;2024-08-12
2. FIHIM: a framework for information hiding in IPv6 using micro-protocols;International Journal of Information Technology;2023-10-04
3. DLCCB: A Dynamic Labeling Based Covert Communication Method on Blockchain;2023 International Wireless Communications and Mobile Computing (IWCMC);2023-06-19
4. Network Stegoinsider Detection;2023 International Russian Smart Industry Conference (SmartIndustryCon);2023-03-27
5. Evaluation of the IP Identification Covert Channel Anomalies Using Support Vector Machine;2021 IEEE 26th International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD);2021-10