Author:
Schaefer Marvin,Gold Barry,Linde Richard,Scheid John
Cited by
18 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Covert channel limitation via special dummy traffic generating;Journal of Computer Virology and Hacking Techniques;2022-05-16
2. Time Protection;Proceedings of the Fourteenth EuroSys Conference 2019;2019-03-25
3. A survey of microarchitectural timing attacks and countermeasures on contemporary hardware;Journal of Cryptographic Engineering;2016-12-26
4. Out-of-Band Covert Channels—A Survey;ACM Computing Surveys;2016-11-11
5. A Survey and Taxonomy Aimed at the Detection and Measurement of Covert Channels;Proceedings of the 4th ACM Workshop on Information Hiding and Multimedia Security;2016-06-20