{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T20:53:17Z","timestamp":1725915197076},"publisher-location":"Cham","reference-count":19,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319685410"},{"type":"electronic","value":"9783319685427"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-68542-7_30","type":"book-chapter","created":{"date-parts":[[2017,11,1]],"date-time":"2017-11-01T11:23:50Z","timestamp":1509535430000},"page":"357-368","source":"Crossref","is-referenced-by-count":0,"title":["Detection of Jitterbug Covert Channel Based on Partial Entropy Test"],"prefix":"10.1007","author":[{"given":"Hao","family":"Wang","sequence":"first","affiliation":[]},{"given":"Guangjie","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Weiwei","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Jiangtao","family":"Zhai","sequence":"additional","affiliation":[]},{"given":"Yuewei","family":"Dai","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,11,2]]},"reference":[{"key":"30_CR1","unstructured":"National Computer Security Center, US DoD: Trusted computer system evaluation criteria, Technical report DOD 5200.28-STD, National Computer Security Center (1985)"},{"issue":"3","key":"30_CR2","doi-asserted-by":"crossref","first-page":"44","DOI":"10.1109\/COMST.2007.4317620","volume":"9","author":"S Zander","year":"2007","unstructured":"Zander, S., Armitage, G., Branch, P.: A survey of covert channels and countermeasures in computer network protocols. IEEE Commun. Surv. Tutor. 9(3), 44\u201357 (2007)","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"30_CR3","doi-asserted-by":"crossref","unstructured":"Padlipsky, M.A., Snow, D.W., Karger, P.A.: Limitations of end-to-end encryption in secure computer networks. Technical report ESD-TR-78-158, Mitre Corporation (1978)","DOI":"10.21236\/ADA059221"},{"issue":"2","key":"30_CR4","doi-asserted-by":"crossref","first-page":"292","DOI":"10.1109\/TSE.1987.233153","volume":"SE-13","author":"CG Girling","year":"1987","unstructured":"Girling, C.G.: Covert channels in LAN\u2019s. IEEE Trans. Softw. Eng. SE-13(2), 292\u2013296 (1987)","journal-title":"IEEE Trans. Softw. Eng."},{"key":"30_CR5","doi-asserted-by":"crossref","unstructured":"Cabuk, S., Brodley, C.E., Shields, C.: IP covert timing channels: design and detection. In: Proceedings of the 11th ACM Conference on Computer and Communications Security, pp. 178\u2013187 (2004)","DOI":"10.1145\/1030083.1030108"},{"key":"30_CR6","unstructured":"Cabuk, S.: Network covert channels: design, analysis, detection, and elimination. Ph.D. thesis, Purdue University, West Lafayette, USA (2006)"},{"key":"30_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"211","DOI":"10.1007\/978-3-540-87403-4_12","volume-title":"Recent Advances in Intrusion Detection","author":"S Gianvecchio","year":"2008","unstructured":"Gianvecchio, S., Wang, H., Wijesekera, D., Jajodia, S.: Model-based covert timing channels: automated modeling and evasion. In: Lippmann, R., Kirda, E., Trachtenberg, A. (eds.) RAID 2008. LNCS, vol. 5230, pp. 211\u2013230. Springer, Heidelberg (2008). doi: 10.1007\/978-3-540-87403-4_12"},{"issue":"2","key":"30_CR8","doi-asserted-by":"crossref","first-page":"199","DOI":"10.1007\/s11235-010-9368-1","volume":"49","author":"G Liu","year":"2012","unstructured":"Liu, G., Zhai, J., Dai, Y.: Network covert timing channel with distribution matching. Telecommun. Syst. Model. Anal. Des. Manag. 49(2), 199\u2013205 (2012)","journal-title":"Telecommun. Syst. Model. Anal. Des. Manag."},{"key":"30_CR9","doi-asserted-by":"crossref","unstructured":"Gianvecchio, S., Wang, H.: Detecting covert timing channels: an entropy-based approach. In: CCS 2007, Alexandria, Virginia, USA (2007)","DOI":"10.1145\/1315245.1315284"},{"issue":"6","key":"30_CR10","doi-asserted-by":"crossref","first-page":"785","DOI":"10.1109\/TDSC.2010.46","volume":"8","author":"S Gianvecchio","year":"2011","unstructured":"Gianvecchio, S., Wang, H.: An entropy-based approach to detecting covert timing channels. IEEE Trans. Dependable Sec. Comput. 8(6), 785\u2013797 (2011)","journal-title":"IEEE Trans. Dependable Sec. Comput."},{"issue":"2","key":"30_CR11","doi-asserted-by":"crossref","first-page":"274","DOI":"10.1109\/TDSC.2015.2423680","volume":"13","author":"PL Shrestha","year":"2016","unstructured":"Shrestha, P.L., Hempel, M., Rezaei, F., Sharif, H.: A support vector machine-based framework for detection of covert timing channels. IEEE Trans. Dependable Sec. Comput. 13(2), 274\u2013283 (2016)","journal-title":"IEEE Trans. Dependable Sec. Comput."},{"key":"30_CR12","unstructured":"Shah, G., Molina, A., Blaze, M.: Keyboards and covert channels. In: Proceedings of the 15th conference on USENIX Security Symposium, pp. 59\u201375 (2006)"},{"issue":"6","key":"30_CR13","doi-asserted-by":"crossref","first-page":"1217","DOI":"10.1016\/j.comnet.2010.11.007","volume":"55","author":"RJ Walls","year":"2011","unstructured":"Walls, R.J., Kothari, K., Wright, M.: Liquid: a detection-resistant covert timing channel based on IPD shaping. Comput. Netw. 55(6), 1217\u20131228 (2011)","journal-title":"Comput. Netw."},{"issue":"3","key":"30_CR14","doi-asserted-by":"crossref","first-page":"647","DOI":"10.1016\/j.comnet.2012.10.008","volume":"57","author":"K Kothari","year":"2013","unstructured":"Kothari, K., Wright, M.: Mimic: an active covert channel that evades regularity-based detection. Comput. Netw. 57(3), 647\u2013657 (2013)","journal-title":"Comput. Netw."},{"issue":"4","key":"30_CR15","first-page":"1927","volume":"10","author":"H Wang","year":"2016","unstructured":"Wang, H., Liu, G., Zhai, J., Dai, Y.: Detection and parameter estimation for Jitterbug covert channel based on coefficient of variation. KSII Trans. Int. Inf. Syst. 10(4), 1927\u20131943 (2016)","journal-title":"KSII Trans. Int. Inf. Syst."},{"key":"30_CR16","unstructured":"Packet traces from WIDE backbone. http:\/\/mawi.wide.ad.jp\/mawi\/ . Accessed 8 May 2016"},{"issue":"3","key":"30_CR17","doi-asserted-by":"crossref","first-page":"389","DOI":"10.15837\/ijccc.2013.3.469","volume":"8","author":"W Mazurczyk","year":"2013","unstructured":"Mazurczyk, W., Kara\u015b, M., Szczypiorski, K.: SkyDe: a skype-based steganographic method. Int. J. Comput. Commun. Control 8(3), 389\u2013400 (2013)","journal-title":"Int. J. Comput. Commun. Control"},{"issue":"B1","key":"30_CR18","doi-asserted-by":"crossref","first-page":"190","DOI":"10.1587\/transcom.E98.B.190","volume":"E98","author":"Z Fu","year":"2015","unstructured":"Fu, Z., Sun, X., Liu, Q., Zhou, L., Shu, J.: Achieving efficient cloud search services: multi-keyword ranked search over encrypted cloud data supporting parallel computing. IEICE Trans. Commun. E98(B1), 190\u2013200 (2015)","journal-title":"IEICE Trans. Commun."},{"issue":"3","key":"30_CR19","doi-asserted-by":"crossref","first-page":"86","DOI":"10.1145\/2566590.2566610","volume":"57","author":"E Zieli\u0144ska","year":"2014","unstructured":"Zieli\u0144ska, E., Mazurczyk, W., Szczypiorski, K.: Trends in steganography. Commun. ACM 57(3), 86\u201395 (2014)","journal-title":"Commun. ACM"}],"container-title":["Lecture Notes in Computer Science","Cloud Computing and Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-68542-7_30","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,5]],"date-time":"2019-10-05T08:53:02Z","timestamp":1570265582000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-68542-7_30"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319685410","9783319685427"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-68542-7_30","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2017]]}}}