{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,14]],"date-time":"2026-01-14T16:54:16Z","timestamp":1768409656856,"version":"3.49.0"},"publisher-location":"Berlin, Heidelberg","reference-count":22,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783642207563","type":"print"},{"value":"9783642207570","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-20757-0_36","type":"book-chapter","created":{"date-parts":[[2011,4,28]],"date-time":"2011-04-28T01:49:00Z","timestamp":1303955340000},"page":"458-470","source":"Crossref","is-referenced-by-count":23,"title":["Stealthier Inter-packet Timing Covert Channels"],"prefix":"10.1007","author":[{"given":"Sebastian","family":"Zander","sequence":"first","affiliation":[]},{"given":"Grenville","family":"Armitage","sequence":"additional","affiliation":[]},{"given":"Philip","family":"Branch","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"3","key":"36_CR1","doi-asserted-by":"publisher","first-page":"44","DOI":"10.1109\/COMST.2007.4317620","volume":"9","author":"S. Zander","year":"2007","unstructured":"Zander, S., Armitage, G., Branch, P.: A Survey of Covert Channels and Countermeasures in Computer Network Protocols. IEEE Communications Surveys and Tutorials\u00a09(3), 44\u201357 (2007)","journal-title":"IEEE Communications Surveys and Tutorials"},{"key":"36_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"211","DOI":"10.1007\/978-3-540-87403-4_12","volume-title":"Recent Advances in Intrusion Detection","author":"S. Gianvecchio","year":"2008","unstructured":"Gianvecchio, S., Wang, H., Wijesekera, D., Jajodia, S.: Model-based covert timing channels: Automated modeling and evasion. In: Lippmann, R., Kirda, E., Trachtenberg, A. (eds.) RAID 2008. LNCS, vol.\u00a05230, pp. 211\u2013230. Springer, Heidelberg (2008)"},{"key":"36_CR3","doi-asserted-by":"crossref","unstructured":"Sellke, S.H., Wang, C.-C., Bagchi, S., Shroff, N.B.: Covert TCP\/IP Timing Channels: Theory to Implementation. In: Conference on Computer Communications (INFOCOM) (April 2009)","DOI":"10.1109\/INFCOM.2009.5062145"},{"issue":"3","key":"36_CR4","doi-asserted-by":"publisher","first-page":"277","DOI":"10.1109\/90.779192","volume":"7","author":"V. Paxson","year":"1999","unstructured":"Paxson, V.: End-to-end Internet Packet Dynamics. IEEE\/ACM Transactions on Networking\u00a07(3), 277\u2013292 (1999)","journal-title":"IEEE\/ACM Transactions on Networking"},{"key":"36_CR5","doi-asserted-by":"crossref","unstructured":"Padlipsky, M.A., Snow, D.W., Karger, P.A.: Limitations of End-to-End Encryption in Secure Computer Networks. Technical Report ESD-TR-78-158, Mitre Corporation (August 1978)","DOI":"10.21236\/ADA059221"},{"key":"36_CR6","unstructured":"Berk, V., Giani, A., Cybenko, G.: Detection of Covert Channel Encoding in Network Packet Delays. Technical Report TR2005-536, Dartmouth College (November 2005)"},{"key":"36_CR7","unstructured":"Shah, G., Molina, A., Blaze, M.: Keyboards and Covert Channels. In: USENIX Security (August 2006)"},{"key":"36_CR8","doi-asserted-by":"crossref","unstructured":"Gianvecchio, S., Wang, H.: Detecting Covert Timing Channels: An Entropy-Based Approach. In: ACM Conference on Computer and Communication Security (CCS) (November 2007)","DOI":"10.1145\/1315245.1315284"},{"key":"36_CR9","unstructured":"Luo, X., Chan, E.W.W., Chang, R.K.C.: TCP Covert Timing Channels: Design and Detection. In: IEEE\/IFIP Conference on Dependable Systems and Networks (DSN) (June 2008)"},{"key":"36_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"120","DOI":"10.1007\/978-3-642-04444-1_8","volume-title":"Computer Security \u2013 ESORICS 2009","author":"Y. Liu","year":"2009","unstructured":"Liu, Y., Ghosal, D., Armknecht, F., Sadeghi, A.-R., Schulz, S., Katzenbeisser, S.: Hide and Seek in Time \u2014 Robust Covert Timing Channels. In: Backes, M., Ning, P. (eds.) ESORICS 2009. LNCS, vol.\u00a05789, pp. 120\u2013135. Springer, Heidelberg (2009)"},{"key":"36_CR11","unstructured":"Quake, \n                    \n                      http:\/\/www.idsoftware.com"},{"key":"36_CR12","doi-asserted-by":"crossref","unstructured":"Branch, P., Heyde, A., Armitage, G.: Rapid Identification of Skype Traffic. In: ACM Network and Operating System Support for Digital Audio and Video (NOSSDAV) (June 2009)","DOI":"10.1145\/1542245.1542266"},{"key":"36_CR13","unstructured":"M2C Measurement Data Repository (December 2003), \n                    \n                      http:\/\/traces.simpleweb.org\/"},{"key":"36_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"197","DOI":"10.1007\/978-3-642-00975-4_20","volume-title":"Passive and Active Network Measurement","author":"C. Henke","year":"2009","unstructured":"Henke, C., Schmoll, C., Zseby, T.: Empirical Evaluation of Hash Functions for PacketID Generation in Sampled Multipoint Measurements. In: Moon, S.B., Teixeira, R., Uhlig, S. (eds.) PAM 2009. LNCS, vol.\u00a05448, pp. 197\u2013206. Springer, Heidelberg (2009)"},{"key":"36_CR15","doi-asserted-by":"crossref","unstructured":"Williams, N., Zander, S., Armitage, G.: A Preliminary Performance Comparison of Five Machine Learning Algorithms for Practical IP Traffic Flow Classification. SIGCOMM Computer Communication Review\u00a036(5) (October 2006)","DOI":"10.1145\/1163593.1163596"},{"key":"36_CR16","first-page":"267","volume-title":"Decision-tree Discovery","author":"R. Kohavi","year":"2002","unstructured":"Kohavi, R., Quinlan, J.R.: Decision-tree Discovery, ch. 16.1.3, pp. 267\u2013276. Oxford University Press, Oxford (2002)"},{"key":"36_CR17","volume-title":"Data Mining: Practical Machine Learning Tools and Techniques","author":"I.H. Witten","year":"2005","unstructured":"Witten, I.H., Frank, E.: Data Mining: Practical Machine Learning Tools and Techniques, 2nd edn. Morgan Kaufmann, San Francisco (2005)","edition":"2"},{"key":"36_CR18","series-title":"Wiley Series in Telecommunications","doi-asserted-by":"publisher","DOI":"10.1002\/0471200611","volume-title":"Elements of Information Theory","author":"T.M. Cover","year":"1991","unstructured":"Cover, T.M., Thomas, J.A.: Elements of Information Theory. Wiley Series in Telecommunications. John Wiley & Sons, Chichester (1991)"},{"key":"36_CR19","unstructured":"Zander, S.: CCHEF - Covert Channels Evaluation Framework (2007), \n                    \n                      http:\/\/caia.swin.edu.au\/cv\/szander\/cc\/cchef\/"},{"key":"36_CR20","unstructured":"Linux Foundation. Netem (2008), \n                    \n                      http:\/\/www.linuxfoundation.org\/en\/Net:Netem"},{"key":"36_CR21","doi-asserted-by":"crossref","unstructured":"Rizo, L., Torres, D., Dehesa, J., Mu\u00f1oz, D.: Cauchy Distribution for Jitter in IP Networks. In: International Conference on Electronics, Communications and Computers, pp. 35\u201340 (2008)","DOI":"10.1109\/CONIELECOMP.2008.39"},{"key":"36_CR22","doi-asserted-by":"crossref","unstructured":"Demichelis, C., Chimento, P.: IP Packet Delay Variation Metric for IP Performance Metrics (IPPM). RFC 3393, IETF (November 2002), \n                    \n                      http:\/\/www.ietf.org\/rfc\/rfc3393.txt","DOI":"10.17487\/rfc3393"}],"container-title":["Lecture Notes in Computer Science","NETWORKING 2011"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-20757-0_36.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,24]],"date-time":"2020-11-24T03:00:20Z","timestamp":1606186820000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-20757-0_36"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642207563","9783642207570"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-20757-0_36","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2011]]}}}