咨询与建议

限定检索结果

文献类型

  • 8 篇 期刊文献

馆藏范围

  • 8 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 7 篇 工学
    • 5 篇 网络空间安全
    • 3 篇 计算机科学与技术...
    • 1 篇 信息与通信工程
  • 1 篇 法学
    • 1 篇 法学
    • 1 篇 公安学
  • 1 篇 医学
    • 1 篇 临床医学

主题

  • 8 篇 covert channel
  • 1 篇 covert channel a...
  • 1 篇 air-gapped netwo...
  • 1 篇 data auditing
  • 1 篇 data exfiltratio...
  • 1 篇 integrity monito...
  • 1 篇 real-time databa...
  • 1 篇 information extr...
  • 1 篇 process control ...
  • 1 篇 embedded interne...
  • 1 篇 dns
  • 1 篇 safety protectio...
  • 1 篇 acoustic waves
  • 1 篇 digital evidence
  • 1 篇 multilevel secur...
  • 1 篇 wireless sensor ...
  • 1 篇 information secu...
  • 1 篇 security
  • 1 篇 blockchain
  • 1 篇 algorithm

机构

  • 1 篇 college of elect...
  • 1 篇 institute of inf...
  • 1 篇 fourth departmen...
  • 1 篇 school of electr...
  • 1 篇 school of softwa...
  • 1 篇 school of comput...
  • 1 篇 department of co...
  • 1 篇 national univers...
  • 1 篇 school of comput...
  • 1 篇 national compute...
  • 1 篇 school of inform...
  • 1 篇 school of comput...
  • 1 篇 school of comput...
  • 1 篇 state key labora...
  • 1 篇 department of co...
  • 1 篇 institut für tec...

作者

  • 1 篇 zhou xueguang
  • 1 篇 jianwei liu
  • 1 篇 peng yang
  • 1 篇 lu jianping
  • 1 篇 liu yunsheng
  • 1 篇 guo yudong
  • 1 篇 qianhong wu
  • 1 篇 shi-guang ju
  • 1 篇 yunze zang
  • 1 篇 wang qingxian
  • 1 篇 zhang huanguo
  • 1 篇 wang xiaorui
  • 1 篇 qin wang
  • 1 篇 thomas bühring
  • 1 篇 xiao yingyuan
  • 1 篇 chang-da wang
  • 1 篇 mingming wang
  • 1 篇 guozheng yang
  • 1 篇 ye li
  • 1 篇 bjorn stelte

语言

  • 8 篇 英文
检索条件"主题词=Covert Channel"
8 条 记 录,以下是1-10 订阅
排序:
Integrated criteria for covert channel auditing
收藏 引用
Journal of Zhejiang University-Science A(Applied Physics & Engineering) 2008年 第6期9卷 737-743页
作者: Chang-da WANG Shi-guang JU School of Computer Science and Telecommunications Engineering Jiangsu University Zhenjiang 212013 China School of Computer Science Carleton University Ottawa Ontario K1S 5B6 Canada
A new concept, the security level difference of a covert channel, is presented, which means the security level span from the sender to the receiver of the covert channel. Based on this, the integrated criteria for cov... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Information Transfer Model of Virtual Machine Based on Storage covert channel
收藏 引用
Wuhan University Journal of Natural Sciences 2013年 第5期18卷 377-384页
作者: WANG Xiaorui WANG Qingxian GUO Yudong LU Jianping Fourth Department PLA Information Engineering University State Key Laboratory of Mathematical Engineering and Advanced Computing Department of Communication Command Chongqing Communication Institute
Aiming at the problem that virtual machine information cannot be extracted incompletely, we extend the typical information extraction model of virtual machine and propose a perception mechanism in virtualization syste... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Detecting DNS covert channels Using Stacking Model
收藏 引用
China Communications 2020年 第10期17卷 183-194页
作者: Peng Yang Ye Li Yunze Zang National Computer Network Emergency Response Technical Team/Coordination Center of China Beijing 100029China Institute of Information Engineering Chinese Academy of SciencesBeijing 100093China
A covert channel is an information channel that is used by the computer process to exfiltrate data through bypassing security *** DNS protocol is one of the important ways to implement a covert *** covert channels are... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Analysis and Application of covert channels of Internet Control Message Protocol
收藏 引用
Wuhan University Journal of Natural Sciences 2006年 第6期11卷 1857-1861页
作者: ZHOU Xueguang ZHANG Huanguo School of Computer Wuhan University Wuhan 430072 Hubei China College of Electronic Engineering Naval University of Engineering Wuhan 430033 Hubei China
Based on the analysis of the covert channel's working mechanism of the internet control message protocol (ICMP) in internet protocol version 4 (IPv4) and Internet Protocol version 6 (IPv6), the ICMP covert cha... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Lightweight and Manageable Digital Evidence Preservation System on Bitcoin
收藏 引用
Journal of Computer Science & Technology 2018年 第3期33卷 568-586页
作者: Mingming Wang Qianhong Wu Bo Qin Qin Wang Jianwei Liu Zhenyu Guan School of Electronic and Information Engineering Beihang University Beijing 100191 China School of Information Renmin University of China Beijing 100872 China
An effective and secure system used for evidence preservation is essential to possess the properties of anti- loss, anti-forgery, anti-tamper and perfect verifiability. Traditional architecture which relies on central... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Data Transmission Using HDD as Microphone
收藏 引用
国际计算机前沿大会会议论文集 2020年 第1期 416-427页
作者: Yongyu Liang Jinghua Zheng Guozheng Yang National University of Defense Technology Hefei 230037China
The technology of covert channel is often used for communications between computers and the Internet with high sensitivity or security ***,some research were carried out on covert channel using computer screen light r... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Concealed Integrity Monitoring for Wireless Sensor Networks
收藏 引用
Wireless Sensor Network 2011年 第1期3卷 10-17页
作者: Bjorn Stelte Thomas Bühring Institut für Technische Informatik Universitat der Bundeswehr MünchenNeubibergGermany
Nowadays, sensor networks are widely installed around the world. Typical sensors provide data for healthcare, energy management, environmental monitoring, etc. In the future sensors will become a part of critical infr... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
An Efficient Secure Real-Time Concurrency Control Protocol
收藏 引用
Wuhan University Journal of Natural Sciences 2006年 第6期11卷 1899-1902页
作者: XIAO Yingyuan LIU Yunsheng CHEN Xiangyang Department of Computer Science and Engineering Tianjin University of Technology Tianjin 300191 China School of Software Huazhong University of Science and Technology Wuhan 430074 Hubei China School of Computer Science and Engineering Wuhan Institute of Technology Wuhan 430073 Hubei China
Secure real-time databases must simultaneously satisfy two requirements in guaranteeing data security and minimizing the missing deadlines ratio of transactions. However, these two requirements can conflict with each ... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论