2009 International Conference on Computational Intelligence and Security 2009
DOI: 10.1109/cis.2009.156
|View full text |Cite
|
Sign up to set email alerts
|

A Normal-Traffic Network Covert Channel

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
19
0

Year Published

2011
2011
2018
2018

Publication Types

Select...
4
1
1

Relationship

0
6

Authors

Journals

citations
Cited by 27 publications
(19 citation statements)
references
References 7 publications
0
19
0
Order By: Relevance
“…We compare proposed model with Ji [26], Ji [27], and Garling [2]. We also generate the synthetic data for study.…”
Section: Resultsmentioning
confidence: 99%
See 4 more Smart Citations
“…We compare proposed model with Ji [26], Ji [27], and Garling [2]. We also generate the synthetic data for study.…”
Section: Resultsmentioning
confidence: 99%
“…We have compared Ji [27] and proposed technique in different time duration and varying the W bit size 2 to 4. We have generated 5.5, 2.5 and 1 hour traffic from node 1 to 4, for both schemes; figure 4 depict the capacity graph.…”
Section: Resultsmentioning
confidence: 99%
See 3 more Smart Citations