1. MLSNet: A Policy Complying Multilevel Security Framework for Software Defined Networking
2. Peter Backs , Steffen Wendzel , and Jörg Keller . 2012 . Dynamic routing in covert channel overlays based on control protocols . In 7th International Conference for Internet Technology and Secured Transactions, ICITST 2012 , London, United Kingdom , December 10-12, 2012, Nick Savage, Safwan El Assad, and Charles A. Shoniregun (Eds.). IEEE, New York, 32–39. https://ieeexplore.ieee.org/document/6470978/ Peter Backs, Steffen Wendzel, and Jörg Keller. 2012. Dynamic routing in covert channel overlays based on control protocols. In 7th International Conference for Internet Technology and Secured Transactions, ICITST 2012, London, United Kingdom, December 10-12, 2012, Nick Savage, Safwan El Assad, and Charles A. Shoniregun (Eds.). IEEE, New York, 32–39. https://ieeexplore.ieee.org/document/6470978/
3. Marketing Database Analytics
4. J. W. Byers , M. Luby , M. Mitzenmacher , and A. Rege . 1998. A Digital Fountain Approach to Reliable Distribution of Bulk Data . In Proc. of the ACM SIGCOMM 1998 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communication (SIGCOMM ’98) , Vancouver, B.C., Canada. ACM, New York, NY, 56–67. J. W. Byers, M. Luby, M. Mitzenmacher, and A. Rege. 1998. A Digital Fountain Approach to Reliable Distribution of Bulk Data. In Proc. of the ACM SIGCOMM 1998 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communication (SIGCOMM ’98), Vancouver, B.C., Canada. ACM, New York, NY, 56–67.
5. IP Covert Channel Detection