Blockchain meets covert communication: A survey
Covert communication enables covert information transmission in an undetectable way to
prevent the exposure of communication behaviors. Blockchain-based covert communication …
prevent the exposure of communication behaviors. Blockchain-based covert communication …
Cloud-based cyber-physical intrusion detection for vehicles using deep learning
Detection of cyber attacks against vehicles is of growing interest. As vehicles typically afford
limited processing resources, proposed solutions are rule-based or lightweight machine …
limited processing resources, proposed solutions are rule-based or lightweight machine …
Towards a reliable detection of covert timing channels over real-time network traffic
Inter-packet delays (IPD) of legitimate network traffic can be exploited for information hiding
purposes and distribution of secret and sensitive data. This process is known as Covert …
purposes and distribution of secret and sensitive data. This process is known as Covert …
Network protocol covert channels: Countermeasures techniques
MA Elsadig, YA Fadlalla - 2017 9th IEEE-GCC Conference and …, 2017 - ieeexplore.ieee.org
advanced developments in intrusion detection systems (IDS) and computer network
technology encourage hackers to find new ways to leak confidential information without …
technology encourage hackers to find new ways to leak confidential information without …
Detecting covert timing channels using non-parametric statistical approaches
Extensive availability and development of Internet applications and services open up the
opportunity for abusing network and Internet resources to distribute malicious data and leak …
opportunity for abusing network and Internet resources to distribute malicious data and leak …
Covert communication using port knocking
Data theft and espionage attacks, which is evolved rapidly, impose the need to develop new
and stealthy communication techniques to protect sensitive data that is transferred over the …
and stealthy communication techniques to protect sensitive data that is transferred over the …
Anomaly Detection Model Based on Multivariate Correlation Analysis Technique to Detect Covert Communication in Wireless Sensor Network
A Swaminathan, P Vivekanandan… - … of Computational and …, 2016 - ingentaconnect.com
Covert channel in the form of insider threat/attack is prominent in posing threats to small
scale networks. In recent years, such attacks are launched on Wireless Sensor Network in …
scale networks. In recent years, such attacks are launched on Wireless Sensor Network in …
[PDF][PDF] Index bit permutations for automatic data redistribution
P Mackerras, B Corrie - Proceedings of the IEEE symposium on Parallel …, 1997 - dl.acm.org
PISTON is a machine independent softwam mework for developing scientific applications on
parallel computers. It presents a consistent data-parallel dism'buted memory model across a …
parallel computers. It presents a consistent data-parallel dism'buted memory model across a …
[图书][B] A novel approach towards real-time covert timing channel detection
F Rezaei - 2015 - search.proquest.com
Today's world of data communication and networks has become, and will continue to be, an
inevitable part of people's lives. Communication technologies, network resources, and …
inevitable part of people's lives. Communication technologies, network resources, and …