{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,11]],"date-time":"2026-04-11T13:13:36Z","timestamp":1775913216065,"version":"3.50.1"},"publisher-location":"Cham","reference-count":15,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783030000141","type":"print"},{"value":"9783030000158","type":"electronic"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-030-00015-8_30","type":"book-chapter","created":{"date-parts":[[2018,9,12]],"date-time":"2018-09-12T16:14:23Z","timestamp":1536768863000},"page":"346-357","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Network Storage Covert Channel Detection Based on Data Joint Analysis"],"prefix":"10.1007","author":[{"given":"Guangxin","family":"Fu","sequence":"first","affiliation":[]},{"given":"Qingbao","family":"Li","sequence":"additional","affiliation":[]},{"given":"Zhifeng","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Guangyu","family":"Zeng","sequence":"additional","affiliation":[]},{"given":"Juanjuan","family":"Gu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,9,13]]},"reference":[{"issue":"8","key":"30_CR1","doi-asserted-by":"publisher","first-page":"284","DOI":"10.1016\/j.cose.2014.03.007","volume":"45","author":"R Archibald","year":"2014","unstructured":"Archibald, R., Ghosal, D.: A comparative analysis of detection metrics for covert timing channels. Comput. Secur. 45(8), 284\u2013292 (2014)","journal-title":"Comput. Secur."},{"issue":"3","key":"30_CR2","doi-asserted-by":"publisher","first-page":"224","DOI":"10.1109\/TE.2016.2520400","volume":"59","author":"T Zseby","year":"2016","unstructured":"Zseby, T., V\u00e1zquez, F.I., Bernhardt, V., et al.: A network steganography lab on detecting TCP\/IP covert channels. IEEE Trans. Educ. 59(3), 224\u2013232 (2016)","journal-title":"IEEE Trans. Educ."},{"key":"30_CR3","doi-asserted-by":"crossref","unstructured":"Shrestha, P.L, Hempel, M., Rezaei, F., et al.: Leveraging statistical feature points for generalized detection of covert timing channels. In: IEEE Military Communications Conference, pp. 7\u201311. IEEE Computer Society (2014)","DOI":"10.1109\/MILCOM.2014.10"},{"key":"30_CR4","unstructured":"H\u00e9lou\u00ebt, L., Jard, C., Zeitoun, M.: Covert channels detection in protocols using scenarios. In: Proceedings of Spv\u2019 Workshop on Security Protocols Verification (2003)"},{"key":"30_CR5","doi-asserted-by":"crossref","unstructured":"Rezaei, F., Hempel, M., Shrestha, P.L., et al.: Detecting covert timing channels using non-parametric statistical approaches. In: Wireless Communications and Mobile Computing Conference, pp. 102\u2013107. IEEE (2015)","DOI":"10.1109\/IWCMC.2015.7289065"},{"key":"30_CR6","doi-asserted-by":"crossref","unstructured":"Zhang, L., Liu, G., Dai, Y.: Network packet length covert channel based on empirical distribution function. J. Netw. 9(6) (2014)","DOI":"10.4304\/jnw.9.6.1440-1446"},{"key":"30_CR7","doi-asserted-by":"crossref","unstructured":"Cao, P., Liu, W., Liu, G., et al.: A wireless covert channel based on constellation shaping modulation. Secur. Commun. Netw. 1\u201315 (2018)","DOI":"10.1155\/2018\/1214681"},{"key":"30_CR8","doi-asserted-by":"crossref","unstructured":"Cabuk, S., Brodley, C.E., Shields, C.: IP covert timing channels: design and detection. In: ACM Conference on Computer and Communications Security, CCS 2004, Washington, DC, USA, October, pp. 178\u2013187. DBLP (2004)","DOI":"10.1145\/1030083.1030108"},{"key":"30_CR9","unstructured":"Berk, V., Giani, A., Cybenko, G.: Detection of covert channel encoding in network packet delays. Rapport Technique Tr (2009)"},{"key":"30_CR10","doi-asserted-by":"crossref","unstructured":"Pang, P., Zhao, H., Bao, Z.: A probability-model-based approach to detect covert timing channel. In: IEEE International Conference on Information and Automation, pp. 1043\u20131047. IEEE (2015)","DOI":"10.1109\/ICInfA.2015.7279440"},{"issue":"2","key":"30_CR11","doi-asserted-by":"publisher","first-page":"274","DOI":"10.1109\/TDSC.2015.2423680","volume":"13","author":"PL Shrestha","year":"2016","unstructured":"Shrestha, P.L., Hempel, M., Rezaei, F., et al.: A support vector machine-based framework for detection of covert timing channels. IEEE Trans. Dependable Secur. Comput. 13(2), 274\u2013283 (2016)","journal-title":"IEEE Trans. Dependable Secur. Comput."},{"key":"30_CR12","doi-asserted-by":"crossref","unstructured":"Gianvecchio, S., Wang, H.: An entropy-based approach to detecting covert timing channels. In: ACM Conference on Computer and Communications Security, Alexandria, Virginia, USA, pp. 307\u2013316. DBLP, October 2011","DOI":"10.1145\/1315245.1315284"},{"key":"30_CR13","unstructured":"Shah, G., Molina, A., Blaze, M.: Keyboards and covert channels. In: Conference on Usenix Security Symposium. USENIX Association (2009)"},{"issue":"5","key":"30_CR14","first-page":"224","volume":"69","author":"Y Lin","year":"2015","unstructured":"Lin, Y., Malik, S.U.R., et al.: Designing and modeling of covert channels in operating systems. IEEE Trans. Comput. 69(5), 224\u2013232 (2015)","journal-title":"IEEE Trans. Comput."},{"issue":"5","key":"30_CR15","doi-asserted-by":"publisher","first-page":"2334","DOI":"10.1109\/TIT.2016.2530089","volume":"62","author":"MR Bloch","year":"2016","unstructured":"Bloch, M.R.: Covert communication over noisy channels: a resolvability perspective. IEEE Trans. Inf. Theor. 62(5), 2334\u20132354 (2016)","journal-title":"IEEE Trans. Inf. Theor."}],"container-title":["Lecture Notes in Computer Science","Cloud Computing and Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-00015-8_30","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,7]],"date-time":"2025-07-07T03:33:32Z","timestamp":1751859212000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-00015-8_30"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783030000141","9783030000158"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-00015-8_30","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018]]},"assertion":[{"value":"ICCCS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Cloud Computing and Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Haikou","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8 June 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"10 June 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"4","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"incodldos2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.icccsconf.org\/icccs2018.html","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}