Deception on the network: thinking differently about covert channels
暂无分享,去创建一个
[1] Craig H. Rowland,et al. Covert Channels in the TCP/IP Protocol Suite , 1997, First Monday.
[2] Jonathan K. Millen. 20 years of covert channel modeling and analysis , 1999, Proceedings of the 1999 IEEE Symposium on Security and Privacy (Cat. No.99CB36344).
[3] James N. Menendez,et al. A Guide to Understanding Audit in Trusted Systems , 1988 .
[4] Niels Provos,et al. Detecting Steganographic Content on the Internet , 2002, NDSS.
[5] Martin P. Loeb,et al. CSI/FBI Computer Crime and Security Survey , 2004 .
[6] F. Meade. A Guide to Understanding Audit in Trusted Systems , 1988 .
[7] Xiapu Luo,et al. TCP covert timing channels: Design and detection , 2008, 2008 IEEE International Conference on Dependable Systems and Networks With FTCS and DCC (DSN).
[8] Laia Miralles,et al. First Monday. Peer-reviewed Journal on the Internet , 2001 .