2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications 2012
DOI: 10.1109/trustcom.2012.267
|View full text |Cite
|
Sign up to set email alerts
|

Subversion Impedance in Covert Communication Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
6
0

Year Published

2012
2012
2023
2023

Publication Types

Select...
3
1

Relationship

1
3

Authors

Journals

citations
Cited by 4 publications
(6 citation statements)
references
References 16 publications
0
6
0
Order By: Relevance
“…In the 'courier' graphs, Co k , k cliques are connected in the same way with the remaining node connected to separate node that is not a member of a clique. Both Cl k and Co k graphs are k-connected and k-neighbor connected and have an order n = k 2 + k. In [7], we also showed that Gunther-Hartnell graphs are optimal covert communications networks. Figure 3 shows the Gunther-Hartnell construction, Cl 3 , on 12 nodes, each connected to exactly 3 neighbors.…”
Section: Gunther-hartnell Graphsmentioning
confidence: 62%
See 4 more Smart Citations
“…In the 'courier' graphs, Co k , k cliques are connected in the same way with the remaining node connected to separate node that is not a member of a clique. Both Cl k and Co k graphs are k-connected and k-neighbor connected and have an order n = k 2 + k. In [7], we also showed that Gunther-Hartnell graphs are optimal covert communications networks. Figure 3 shows the Gunther-Hartnell construction, Cl 3 , on 12 nodes, each connected to exactly 3 neighbors.…”
Section: Gunther-hartnell Graphsmentioning
confidence: 62%
“…Second, the network is resilient against disconnection through the removal of multiple neighborhoods of nodes. In [7], we developed a measure for quantifying the suitability of topologies to achieve these two criteria. This measure examines the effect on the topology from the removal of a subverted node and its compromised neighbors.…”
Section: Quantifying Topologies In Covert Communications Networkmentioning
confidence: 99%
See 3 more Smart Citations