Author:
Sadeghi Ahmad-Reza,Schulz Steffen,Varadharajan Vijay
Publisher
Springer Berlin Heidelberg
Reference40 articles.
1. Cohesive Flexible Technologies: VPN-Cubed (2012),
http://cohesiveft.com
2. Lecture Notes in Computer Science;L. Catuogno,2010
3. Lecture Notes in Computer Science;J. Carapinha,2010
4. Lampson, B.W.: A note on the confinement problem. Communications of the ACM 16(10) (1973)
5. National Computer Security Center: A Guide to Understanding Covert Channel Analysis of Trusted System (1993)
Cited by
7 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. LFETT2021: A Large-scale Fine-grained Encrypted Tunnel Traffic Dataset;2021 IEEE 20th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom);2021-10
2. A Timestamp-Regulating VoLTE Covert Channel against Statistical Analysis;Mobile Networks and Applications;2019-12-21
3. A Hybrid Covert Channel with Feedback over Mobile Networks;Communications in Computer and Information Science;2019
4. A Survey of Timing Channels and Countermeasures;ACM Computing Surveys;2018-01-31
5. Network Steganography;Information Hiding in Communication Networks: Fundamentals, Mechanisms, Applications, and Countermeasures;2016-03-05