Blockchain meets covert communication: A survey

Z Chen, L Zhu, P Jiang, C Zhang, F Gao… - … Surveys & Tutorials, 2022 - ieeexplore.ieee.org
Covert communication enables covert information transmission in an undetectable way to
prevent the exposure of communication behaviors. Blockchain-based covert communication …

Cloud-based cyber-physical intrusion detection for vehicles using deep learning

G Loukas, T Vuong, R Heartfield, G Sakellari… - Ieee …, 2017 - ieeexplore.ieee.org
Detection of cyber attacks against vehicles is of growing interest. As vehicles typically afford
limited processing resources, proposed solutions are rule-based or lightweight machine …

Towards a reliable detection of covert timing channels over real-time network traffic

F Rezaei, M Hempel, H Sharif - IEEE Transactions on …, 2017 - ieeexplore.ieee.org
Inter-packet delays (IPD) of legitimate network traffic can be exploited for information hiding
purposes and distribution of secret and sensitive data. This process is known as Covert …

Network protocol covert channels: Countermeasures techniques

MA Elsadig, YA Fadlalla - 2017 9th IEEE-GCC Conference and …, 2017 - ieeexplore.ieee.org
advanced developments in intrusion detection systems (IDS) and computer network
technology encourage hackers to find new ways to leak confidential information without …

Detecting covert timing channels using non-parametric statistical approaches

F Rezaei, M Hempel, PL Shrestha… - 2015 International …, 2015 - ieeexplore.ieee.org
Extensive availability and development of Internet applications and services open up the
opportunity for abusing network and Internet resources to distribute malicious data and leak …

Covert communication using port knocking

M Khader, A Hadi, A Hudaib - 2016 Cybersecurity and …, 2016 - ieeexplore.ieee.org
Data theft and espionage attacks, which is evolved rapidly, impose the need to develop new
and stealthy communication techniques to protect sensitive data that is transferred over the …

Anomaly Detection Model Based on Multivariate Correlation Analysis Technique to Detect Covert Communication in Wireless Sensor Network

A Swaminathan, P Vivekanandan… - … of Computational and …, 2016 - ingentaconnect.com
Covert channel in the form of insider threat/attack is prominent in posing threats to small
scale networks. In recent years, such attacks are launched on Wireless Sensor Network in …

[PDF][PDF] Index bit permutations for automatic data redistribution

P Mackerras, B Corrie - Proceedings of the IEEE symposium on Parallel …, 1997 - dl.acm.org
PISTON is a machine independent softwam mework for developing scientific applications on
parallel computers. It presents a consistent data-parallel dism'buted memory model across a …

[图书][B] A novel approach towards real-time covert timing channel detection

F Rezaei - 2015 - search.proquest.com
Today's world of data communication and networks has become, and will continue to be, an
inevitable part of people's lives. Communication technologies, network resources, and …