Computer Science ›› 2015, Vol. 42 ›› Issue (2): 114-117.doi: 10.11896/j.issn.1002-137X.2015.02.024
Previous Articles Next Articles
LIU Biao, LAN Shao-hua, ZHANG Jing and LIU Guang-jie
[1] Lampson B W.A note on the confinement problem[J].Communications of the ACM,1973,6(10):613-615 [2] Girling C G.Covert channels in LAN’s[J].IEEE Trans.on Software Engineering,1987,SE-13(2):292-296 [3] Cabuk S,Brodley C E,Shields C.IP covert timing channels:Design and detection[C]∥Proc.of the 11th ACM Conf.on Computer and Communications Security.2004:178-187 [4] Cabuk S.Network Covert Channels:Design,Analysis,Detec-tion,and Elimination[D].Lafayette:Purdue University,2006 [5] Gianvecchio S,et al.Model-Based Covert Timing Channels:Automated Modeling and Evasion[J].Lecture Notes in Computer Science,2008,5230:211-230 [6] Liu Guang-jie,et al.Covert Timing Channel with DistributionMatch[C]∥International Conference on Multimedia Informations Networking and security.2009:565-568 [7] Shah G,Molina A,Blaze M.Keyboards and Covert Channels[C]∥Proceedings of the 15th conference on USENIX Security Symposium.2006:472-478 [8] Robert J Walls,Kush Kothari,Wright M.Liquid:A detection-resistant covert timing channel based on IPD shaping [J].Computer Networks,2011(55):1217-1228 (下转第149页)(上接第117页) [9] Luo X,Chan E W W,Chang R K C.Cloak:A Ten-Fold Way for Reliable Covert Communications[C]∥Proc.European Symp.Research in Computer Security.Sept.2007 [10] Luo Xia-pu,et al.TCP covert timing channels:Design and detection[C]∥IEEE International Conference on Dependable Systems and Networks With FTCS and DCC.2008:420-429 [11] Peng P,Ning P,Reeves D.On the Secrecy of Timing-Based Active Watermarking Trace-Back Techniques[C]∥Proc.IEEE Symp.Security and Privacy.May 2006 [12] Berk V,Giani A,Cybenko G.Detection of covert channel encoding in network packet delays[R].Technical Report,TR2005536.Department of Computer Science,Dartmouth College,2005:1-11 [13] Gianvecchio S,Wang H N.Detecting covert timing channels:An entropy-based approach[C]∥Proc.of the 14th ACM Conf.on Computer and Communications Security.2007:307-316 [14] Takens F.Detecting strange attractors in turbulence:Dynamical systems and turbulence[C]∥Rand D A,Young L S,eds.Lecture Notes in Mathematics.1981,366 [15] Eckmann J P,Kamphorst S O,Ruelle D.Recurrence Plots of Dynamical Systems [J].Europhysics Letter,1987,4:973-977 [16] Groth A.Visualization of coupling in time series by order recurrence plots[J].Phys.Rev.E,2005,72:046220 [17] Waikato VIII.http://wand.net.nz/wits/waikato/8 |
No related articles found! |
|