Provenance Transmission through a Two-Dimensional Covert Timing Channel in WSNs
暂无分享,去创建一个
[1] Sonia Fahmy,et al. A practical approach for provenance transmission in wireless sensor networks , 2014, Ad Hoc Networks.
[2] Elisa Bertino,et al. Secure Provenance Transmission for Streaming Data , 2013, IEEE Transactions on Knowledge and Data Engineering.
[3] Xianmin Wang,et al. Building packet length covert channel over mobile VoIP traffics , 2018, J. Netw. Comput. Appl..
[4] Jianhua Li,et al. A study of on/off timing channel based on packet delay distribution , 2009, Comput. Secur..
[5] Ehab Al-Shaer,et al. A Novel Class of Robust Covert Channels Using Out-of-Order Packets , 2017, IEEE Transactions on Dependable and Secure Computing.
[6] Elisa Bertino,et al. Dictionary Based Secure Provenance Compression for Wireless Sensor Networks , 2016, IEEE Transactions on Parallel and Distributed Systems.
[7] Lei Huang,et al. Base communication model of IP covert timing channels , 2016, Frontiers of Computer Science.
[8] M.T. Goodrich,et al. Probabilistic Packet Marking for Large-Scale IP Traceback , 2008, IEEE/ACM Transactions on Networking.
[9] Liehuang Zhu,et al. A packet-reordering covert channel over VoLTE voice and video traffics , 2019, J. Netw. Comput. Appl..
[10] Elisa Bertino,et al. Sensor Network Provenance Compression Using Dynamic Bayesian Networks , 2017, ACM Trans. Sens. Networks.
[11] Sushil Jajodia,et al. Model-Based Covert Timing Channels: Automated Modeling and Evasion , 2008, RAID.
[12] Philip Levis,et al. CTP , 2013, ACM Trans. Sens. Networks.
[13] Craig Partridge,et al. Packet reordering is not pathological network behavior , 1999, TNET.
[14] Yu Zhang,et al. A payload-dependent packet rearranging covert channel for mobile VoIP traffic , 2018, Inf. Sci..
[15] Cristian S. Calude,et al. Randomness relative to Cantor expansions , 2003, nlin/0304019.
[16] Elisa Bertino,et al. A Lightweight Secure Scheme for Detecting Provenance Forgery and Packet DropAttacks in Wireless Sensor Networks , 2015, IEEE Transactions on Dependable and Secure Computing.
[17] Elisa Bertino,et al. Provenance for Wireless Sensor Networks: A Survey , 2016, Data Science and Engineering.