2022
DOI: 10.1016/j.array.2022.100131
|View full text |Cite
|
Sign up to set email alerts
|

A generalized approach to estimation of memoryless covert channel information leakage capacity

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2022
2022
2022
2022

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(2 citation statements)
references
References 22 publications
0
2
0
Order By: Relevance
“…Accordingly, the adversary neutralizes the CSC through data rewriting and format normalization. The packet rate is high for real‐time communication applications, and the covert channel based on stored content also performs well 35,36 . The CSC works well in video and multimedia applications when combined with stealthy and other data embedding technologies 37,38 .…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Accordingly, the adversary neutralizes the CSC through data rewriting and format normalization. The packet rate is high for real‐time communication applications, and the covert channel based on stored content also performs well 35,36 . The CSC works well in video and multimedia applications when combined with stealthy and other data embedding technologies 37,38 .…”
Section: Related Workmentioning
confidence: 99%
“…The packet rate is high for real-time communication applications, and the covert channel based on stored content also performs well. 35,36 The CSC works well in video and multimedia applications when combined with stealthy and other data embedding technologies. 37,38 The CTC, unlike the CSC, is based on fine-tuning traffic transmission patterns without modifying the precise content.…”
Section: Related Workmentioning
confidence: 99%