Author:
Zhang Xiaosong,Guo Linhong,Xue Yuan,Jiang Hongwei,Liu Lu,Zhang Quanxin
Reference18 articles.
1. Lampson, B.W.: A note on the confinement problem. Commun. ACM 16(10), 613–615 (1973)
2. Department of Defense Trusted Computer System Evaluation Criteria, pp. 69–72. Palgrave Macmillan UK, London (1985)
3. Mazurczyk, W., Szczypiorski, K.: Evaluation of steganographic methods for oversized IP packets. Telecommun. Syst. 49(2), 207–217 (2012)
4. Lecture Notes in Computer Science;A-R Sadeghi,2012
5. Rios, R., Onieva, J.A., Lopez, J.: Covert communications through network configuration messages. Comput. Secur. 39(4), 34–46 (2013)