{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,15]],"date-time":"2025-11-15T10:29:51Z","timestamp":1763202591055,"version":"3.40.3"},"publisher-location":"Cham","reference-count":12,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030996185"},{"type":"electronic","value":"9783030996192"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-3-030-99619-2_51","type":"book-chapter","created":{"date-parts":[[2022,3,30]],"date-time":"2022-03-30T05:19:48Z","timestamp":1648617588000},"page":"546-555","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Covert Timing Channels Detection Based on Image Processing Using Deep Learning"],"prefix":"10.1007","author":[{"given":"Shorouq","family":"Al-Eidi","sequence":"first","affiliation":[]},{"given":"Omar","family":"Darwish","sequence":"additional","affiliation":[]},{"given":"Yuanzhu","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Mahmoud","family":"Elkhodr","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,3,31]]},"reference":[{"issue":"8","key":"51_CR1","doi-asserted-by":"publisher","first-page":"2417","DOI":"10.3390\/s20082417","volume":"20","author":"S Al-Eidi","year":"2020","unstructured":"Al-Eidi, S., Darwish, O., Chen, Y.: Covert timing channel analysis either as cyber attacks or confidential applications. Sensors 20(8), 2417 (2020)","journal-title":"Sensors"},{"doi-asserted-by":"crossref","unstructured":"Al-Eidi, S., Darwish, O., Chen, Y., Husari, G.: SnapCatch: automatic detection of covert timing channels using image processing and machine learning. IEEE Access 9, 177\u2013191 (2020)","key":"51_CR2","DOI":"10.1109\/ACCESS.2020.3046234"},{"key":"51_CR3","doi-asserted-by":"publisher","first-page":"284","DOI":"10.1016\/j.cose.2014.03.007","volume":"45","author":"R Archibald","year":"2014","unstructured":"Archibald, R., Ghosal, D.: A comparative analysis of detection metrics for covert timing channels. Comput. Secur. 45, 284\u2013292 (2014)","journal-title":"Comput. Secur."},{"doi-asserted-by":"crossref","unstructured":"Borders, K., Prakash, A.: Web tap: detecting covert web traffic. In: Proceedings of the 11th ACM Conference on Computer and Communications Security, pp. 110\u2013120 (2004)","key":"51_CR4","DOI":"10.1145\/1030083.1030100"},{"unstructured":"Cabuk, S.: Network covert channels: design, analysis, detection, and elimination. Ph.D. thesis, Purdue University (2006)","key":"51_CR5"},{"doi-asserted-by":"crossref","unstructured":"Cabuk, S., Brodley, C.E., Shields, C.: IP covert timing channels: design and detection. In: Proceedings of the 11th ACM Conference on Computer and Communications Security, pp. 178\u2013187. ACM (2004)","key":"51_CR6","DOI":"10.1145\/1030083.1030108"},{"issue":"6","key":"51_CR7","doi-asserted-by":"publisher","first-page":"785","DOI":"10.1109\/TDSC.2010.46","volume":"8","author":"S Gianvecchio","year":"2010","unstructured":"Gianvecchio, S., Wang, H.: An entropy-based approach to detecting covert timing channels. IEEE Trans. Dependable Secure Comput. 8(6), 785\u2013797 (2010)","journal-title":"IEEE Trans. Dependable Secure Comput."},{"doi-asserted-by":"crossref","unstructured":"He, K., Zhang, X., Ren, S., Sun, J.: Deep residual learning for image recognition. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 770\u2013778 (2016)","key":"51_CR8","DOI":"10.1109\/CVPR.2016.90"},{"unstructured":"Ioffe, S., Szegedy, C.: Batch normalization: accelerating deep network training by reducing internal covariate shift. In: International Conference on Machine Learning, pp. 448\u2013456. PMLR (2015)","key":"51_CR9"},{"issue":"2","key":"51_CR10","doi-asserted-by":"publisher","first-page":"178","DOI":"10.1007\/s11859-018-1308-z","volume":"23","author":"L Lu","year":"2018","unstructured":"Lu, L., Yang, Y., Jiang, Y., Ai, H., Tu, W.: Shallow convolutional neural networks for acoustic scene classification. Wuhan Univ. J. Nat. Sci. 23(2), 178\u2013184 (2018)","journal-title":"Wuhan Univ. J. Nat. Sci."},{"doi-asserted-by":"crossref","unstructured":"Shrestha, P.L., Hempel, M., Rezaei, F., Sharif, H.: Leveraging statistical feature points for generalized detection of covert timing channels. In: 2014 IEEE Military Communications Conference, pp. 7\u201311. IEEE (2014)","key":"51_CR11","DOI":"10.1109\/MILCOM.2014.10"},{"unstructured":"Simonyan, K., Zisserman, A.: Very deep convolutional networks for large-scale image recognition. arXiv preprint arXiv:1409.1556 (2014)","key":"51_CR12"}],"container-title":["Lecture Notes in Networks and Systems","Advanced Information Networking and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-99619-2_51","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,3,30]],"date-time":"2022-03-30T06:17:06Z","timestamp":1648621026000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-99619-2_51"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9783030996185","9783030996192"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-99619-2_51","relation":{},"ISSN":["2367-3370","2367-3389"],"issn-type":[{"type":"print","value":"2367-3370"},{"type":"electronic","value":"2367-3389"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"31 March 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"AINA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Advanced Information Networking and Applications","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Sydney, NSW","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Australia","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"13 April 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15 April 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"aina2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/voyager.ce.fit.ac.jp\/conf\/aina\/2022\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}