A sensitive network jitter measurement for covert timing channels over interactive traffic
暂无分享,去创建一个
[1] Hamid Sharif,et al. Towards a Reliable Detection of Covert Timing Channels over Real-Time Network Traffic , 2017, IEEE Transactions on Dependable and Secure Computing.
[2] G. Lakpathi,et al. Identity-Based Encryption with Outsourced Revocation in Cloud Computing , 2016 .
[3] Jean Meloche,et al. Statistical Aspects of the Analysis of Data Networks , 2007, Technometrics.
[4] Alessandro Andreadis,et al. A cross-layer jitter-based TCP for wireless networks , 2016, EURASIP J. Wirel. Commun. Netw..
[5] Stefano Avallone,et al. An analysis of the impact of network device buffers on packet schedulers through experiments and simulations , 2018, Simul. Model. Pract. Theory.
[6] Xiaojun Chang,et al. Semisupervised Feature Analysis by Mining Correlations Among Multiple Tasks , 2014, IEEE Transactions on Neural Networks and Learning Systems.
[7] Jin Li,et al. Privacy-preserving outsourced classification in cloud computing , 2017, Cluster Computing.
[8] Witawas Srisa-an,et al. SigPID: significant permission identification for android malware detection , 2016, 2016 11th International Conference on Malicious and Unwanted Software (MALWARE).
[9] Mahmoud Al-Ayyoub,et al. Accelerating 3D medical volume segmentation using GPUs , 2016, Multimedia Tools and Applications.
[10] Mohsen Guizani,et al. Toward Delay-Tolerant Flexible Data Access Control for Smart Grid With Renewable Energy Resources , 2017, IEEE Transactions on Industrial Informatics.
[11] Carla E. Brodley,et al. IP covert timing channels: design and detection , 2004, CCS '04.
[12] Dipak Ghosal,et al. A Covert Timing Channel Based on Fountain Codes , 2012, 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications.
[13] Jian Shen,et al. Cloud-aided lightweight certificateless authentication protocol with anonymity for wireless body area networks , 2018, J. Netw. Comput. Appl..
[14] Dipak Ghosal,et al. A Survey of Timing Channels and Countermeasures , 2017, ACM Comput. Surv..
[15] Yuan Xue,et al. A code protection scheme by process memory relocation for android devices , 2017, Multimedia Tools and Applications.
[16] Chung G. Kang,et al. LTE Network Emulator for VoLTE Service , 2014 .
[17] Feiping Nie,et al. Compound Rank- $k$ Projections for Bilinear Analysis , 2014, IEEE Transactions on Neural Networks and Learning Systems.
[18] Marcin Szpyrka. FAST AND FLEXIBLE MODELLING OF REAL-TIME SYSTEMS WITH RTCP-NETS , 2004 .
[19] Jin Li,et al. Flexible neural trees based early stage identification for IP traffic , 2017, Soft Comput..
[20] Jie Wu,et al. Preserving Privacy with Probabilistic Indistinguishability in Weighted Social Networks , 2017, IEEE Transactions on Parallel and Distributed Systems.
[21] Xiaojun Chang,et al. Feature Interaction Augmented Sparse Learning for Fast Kinect Motion Detection , 2017, IEEE Transactions on Image Processing.
[22] Xiangyun Zhou,et al. On Covert Communication With Noise Uncertainty , 2016, IEEE Communications Letters.
[23] Yi Yang,et al. Bi-Level Semantic Representation Analysis for Multimedia Event Detection , 2017, IEEE Transactions on Cybernetics.
[24] Yi Yang,et al. Semantic Pooling for Complex Event Analysis in Untrimmed Videos , 2017, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[25] Yu-Hui Wang,et al. Applying Patent-Based Fuzzy Quality Function Deployment to Explore Prospective VoLTE Technologies , 2016, Int. J. Fuzzy Syst..
[26] Rauf Izmailov,et al. Performance Optimization of VoIP using an Overlay Network , 2005 .
[27] Sushil Jajodia,et al. Model-Based Covert Timing Channels: Automated Modeling and Evasion , 2008, RAID.
[28] Jacob Philip,et al. Composition dependence of optical band gap and thermal diffusivity of AsTeSe glasses , 1992 .
[29] Yu-an Tan,et al. A methodology for determining the image base of ARM-based industrial control system firmware , 2017, Int. J. Crit. Infrastructure Prot..
[30] Henning Schulzrinne,et al. RTP: A Transport Protocol for Real-Time Applications , 1996, RFC.
[31] N. deSouza,et al. Investigation of metabolite changes in the transition from pre‐invasive to invasive cervical cancer measured using 1H and 31P magic angle spinning MRS of intact tissue , 2009, NMR in biomedicine.
[32] Henning Schulzrinne,et al. Internet Services: from Electronic Mail to Real-Time Multimedia , 1995, Kommunikation in Verteilten Systemen.
[33] Xiaojiang Du,et al. Achieving Efficient and Secure Data Acquisition for Cloud-Supported Internet of Things in Smart Grid , 2017, IEEE Internet of Things Journal.
[34] Georg Carle,et al. Survey of error recovery techniques for IP-based audio-visual multicast applications , 1997, IEEE Netw..
[35] Can Zhang,et al. Cryptographic key protection against FROST for mobile devices , 2016, Cluster Computing.
[36] Kwang-deok Seo,et al. A client-driven media synchronization mechanism for RTP packet-based video streaming , 2015, Journal of Real-Time Image Processing.
[37] Yuan Xue,et al. An Identity-Based Proxy Signature on NTRU Lattice , 2018 .
[38] Jin Li,et al. Secure attribute-based data sharing for resource-limited users in cloud computing , 2018, Comput. Secur..
[39] Mahmoud Al-Ayyoub,et al. Improving the performance of the needleman-wunsch algorithm using parallelization and vectorization techniques , 2017, Multimedia Tools and Applications.
[40] Jin Li,et al. Insight of the protection for data security under selective opening attacks , 2017, Inf. Sci..
[41] Kejie Lu,et al. Construction and Mitigation of User-Behavior-Based Covert Channels on Smartphones , 2018, IEEE Transactions on Mobile Computing.
[42] Liehuang Zhu,et al. A round-optimal lattice-based blind signature scheme for cloud services , 2017, Future Gener. Comput. Syst..
[43] B. B. Gupta,et al. Secure and imperceptible digital image steganographic algorithm based on diamond encoding in DWT domain , 2017, Multimedia Tools and Applications.
[44] Chen Liang,et al. An optimized data hiding scheme for Deflate codes , 2018, Soft Comput..
[45] Zhenyu Wu,et al. Whispers in the Hyper-Space: High-Bandwidth and Reliable Covert Channel Attacks Inside the Cloud , 2015, IEEE/ACM Transactions on Networking.
[46] Xiaojiang Du,et al. Towards Delay-Tolerant Flexible Data Access Control for Smart Grid with Renewable Energy Resources , 2018, ArXiv.
[47] Chengqi Zhang,et al. Convex Sparse PCA for Unsupervised Feature Learning , 2014, ACM Trans. Knowl. Discov. Data.
[48] Ghizlane Orhanou,et al. Secure Mobile Multi Cloud Architecture for Authentication and Data Storage , 2017, Int. J. Cloud Appl. Comput..
[49] Zouhair Guennoun,et al. Towards successful VoLTE and VoWiFi deployment: network function virtualization solutions’ benefits and challenges , 2017, Telecommun. Syst..