Covert Channel Analysis and Detection with Reverse Proxy Servers using Microsoft Windows
暂无分享,去创建一个
[1] Clark Weissman. Handbook for the Computer Security Certification of Trusted Systems , 1995 .
[2] Butler W. Lampson,et al. A note on the confinement problem , 1973, CACM.
[3] Virgil D. Gligor,et al. A guide to understanding covert channel analysis of trusted systems , 1993 .
[4] Marco de Vivo,et al. Internet vulnerabilities related to TCP/IP and T/TCP , 1999, CCRV.
[5] Manfred Wolf. Covert Channels in LAN Protocols , 1989, LANSEC.
[6] Craig H. Rowland,et al. Covert Channels in the TCP/IP Protocol Suite , 1997, First Monday.