Unified Description for Network Information Hiding Methods
暂无分享,去创建一个
[1] Scott Craver,et al. On Public-Key Steganography in the Presence of an Active Warden , 1998, Information Hiding.
[2] Ira S. Moskowitz,et al. Covert Channels - A Context-Based View , 1996, Information Hiding.
[3] Robert F. Heizer,et al. The Background of Thomsen's Three-Age System , 1962 .
[4] Thomas Rist,et al. Covert Channels and Their Prevention in Building Automation Protocols: A Prototype Exemplified Using BACnet , 2012, 2012 IEEE International Conference on Green Computing and Communications.
[5] Jessica Fridrich,et al. Steganography in Digital Media: References , 2009 .
[6] Stephen Hailes,et al. Covert channel attacks in pervasive computing , 2015, 2015 IEEE International Conference on Pervasive Computing and Communications (PerCom).
[7] Markus G. Kuhn,et al. Information hiding-a survey , 1999, Proc. IEEE.
[8] C. Gray Girling,et al. Covert Channels in LAN's , 1987, IEEE Transactions on Software Engineering.
[9] P ? ? ? ? ? ? ? % ? ? ? ? , 1991 .
[10] Steven J. Murdoch,et al. Covert Channels for Collusion in Online Computer Games , 2004, Information Hiding.
[11] Sihan Qing,et al. Optimization of covert channel identification , 2005, Third IEEE International Security in Storage Workshop (SISW'05).
[12] Sebastian Zander,et al. Stealthier Inter-packet Timing Covert Channels , 2011, Networking.
[13] John Aycock,et al. Improved port knocking with strong authentication , 2005, 21st Annual Computer Security Applications Conference (ACSAC'05).
[14] Colin Allison,et al. Covert Channels in Internet Protocols: A Survey , 2005 .
[15] Sebastian Zander,et al. A survey of covert channels and countermeasures in computer network protocols , 2007, IEEE Communications Surveys & Tutorials.
[16] Stefan Katzenbeisser,et al. Robust and Undetectable Steganographic Timing Channels for i.i.d. Traffic , 2010, Information Hiding.
[17] Steffen Wendzel,et al. Envisioning Smart Building Botnets , 2014, Sicherheit.
[18] Grzegorz Lewandowski,et al. Covert Channels in IPv6 , 2005, Privacy Enhancing Technologies.
[19] John B. Shoven,et al. I , Edinburgh Medical and Surgical Journal.
[20] Steffen Wendzel,et al. Creativity in Mind: Evaluating and Maintaining Advances in Network Steganographic Research , 2015, J. Univers. Comput. Sci..
[21] Vijay Varadharajan,et al. The Silence of the LANs: Efficient Leakage Resilience for IPsec VPNs , 2012, IEEE Transactions on Information Forensics and Security.
[22] Carlisle M. Adams,et al. Out-of-Band Covert Channels—A Survey , 2016, ACM Comput. Surv..
[23] Manfred Wolf. Covert Channels in LAN Protocols , 1989, LANSEC.
[24] Javier López,et al. Covert communications through network configuration messages , 2013, Comput. Secur..
[26] Sally Fincher,et al. Perspectives on HCI patterns: concepts and tools (introducing PLML) , 2003 .
[27] Aleksandra Mileva,et al. Covert channels in TCP/IP protocol stack - extended version- , 2014, Central European Journal of Computer Science.
[28] Javier López,et al. HIDE_DHCP: Covert Communications through Network Configuration Messages , 2012, SEC.
[29] 김인택. [서평]「Information Hiding Techniques for Steganography and Digital Watermarking」 , 2000 .
[30] Sushil Jajodia,et al. Model-Based Covert Timing Channels: Automated Modeling and Evasion , 2008, RAID.
[31] Jana Dittmann,et al. WLAN steganography: a first practical review , 2006, MM&Sec '06.
[32] Carla E. Brodley,et al. IP covert timing channels: design and detection , 2004, CCS '04.
[33] Carlisle M. Adams,et al. A Survey and Taxonomy Aimed at the Detection and Measurement of Covert Channels , 2016, IH&MMSec.
[34] Wojciech Mazurczyk,et al. On importance of steganographic cost for network steganography , 2016, Secur. Commun. Networks.
[35] Zhang Yong,et al. Entropy based taxonomy of network convert channels , 2009, 2009 2nd International Conference on Power Electronics and Intelligent Transportation System (PEITS).
[36] Nikita Borisov,et al. RAINBOW: A Robust And Invisible Non-Blind Watermark for Network Flows , 2009, NDSS.
[37] Georgios Kambourakis,et al. Hidden in Plain Sight. SDP-Based Covert Channel for Botnet Communication , 2015, TrustBus.
[38] O. Roeva,et al. Information Hiding: Techniques for Steganography and Digital Watermarking , 2000 .
[39] Raheem A. Beyah,et al. An 802.11 MAC layer covert channel , 2012, Wirel. Commun. Mob. Comput..
[40] Ira S. Moskowitz,et al. A pump for rapid, reliable, secure communication , 1993, CCS '93.
[41] Mike Fisk,et al. Eliminating Steganography in Internet Traffic with Active Wardens , 2002, Information Hiding.
[42] Gustavus J. Simmons,et al. The Prisoners' Problem and the Subliminal Channel , 1983, CRYPTO.
[43] P. Stevens,et al. History of Taxonomy , 2003 .
[44] Wojciech Mazurczyk,et al. Information Hiding as a Challenge for Malware Detection , 2015, IEEE Security & Privacy.
[45] Jan O. Borchers. A pattern approach to interaction design , 2001, DIS '00.
[46] Sebastian Zander,et al. Covert channels in multiplayer first person shooter online games , 2008, 2008 33rd IEEE Conference on Local Computer Networks (LCN).
[47] Sebastian Zander,et al. An Improved Clock-skew Measurement Technique for Revealing Hidden Services , 2008, USENIX Security Symposium.
[48] Sebastian Zander,et al. Pattern-Based Survey and Categorization of Network Covert Channel Techniques , 2014, ACM Comput. Surv..
[49] Craig H. Rowland,et al. Covert Channels in the TCP/IP Protocol Suite , 1997, First Monday.
[50] Theodore G. Handel,et al. Hiding Data in the OSI Network Model , 1996, Information Hiding.
[51] Steve R. White. Covert Distributed Processing with Computer Viruses , 1989, CRYPTO.
[52] George Danezis,et al. Low-cost traffic analysis of Tor , 2005, 2005 IEEE Symposium on Security and Privacy (S&P'05).