Covert Channel Analysis and Data Hiding in TCP/IP

作者: Kamran Ahsan

DOI:

关键词:

摘要:

参考文章(22)
David K. Arrowsmith, C. M. Place, An Introduction to Dynamical Systems ,(1990)
Ioannis Pitas, Georgios Vougiatzis, Chaotic Mixing of Digital Images and Applications to Watermarking Proc. of European Conf. on Multimedia Applications,services and Techniques (ECMAST'96). ,(1996)
Elizabeth D. Zwicky, D. Brent Chapman, Deborah Russell, Building Internet Firewalls ,(1995)
Giovanni Vigna, A Topological Characterization of TCP/IP Security formal methods. pp. 914- 939 ,(2003) , 10.1007/978-3-540-45236-2_49
Theodore G. Handel, Maxwell T. Sandford, Hiding Data in the OSI Network Model information hiding. pp. 23- 38 ,(1996) , 10.1007/3-540-61996-8_29
Dorothy Elizabeth Robling Denning, Cryptography and data security ,(1982)
J. Postel, Internet Control Message Protocol RFC. ,vol. 777, pp. 1- 14 ,(1981)
Steven B. Lipner, A comment on the confinement problem ACM SIGOPS Operating Systems Review. ,vol. 9, pp. 192- 196 ,(1975) , 10.1145/1067629.806537
Marvin Schaefer, Barry Gold, Richard Linde, John Scheid, Program confinement in KVM/370 Proceedings of the 1977 annual conference on - ACM '77. pp. 404- 410 ,(1977) , 10.1145/800179.1124633