{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T13:13:05Z","timestamp":1725455585921},"publisher-location":"Berlin, Heidelberg","reference-count":16,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642351297"},{"type":"electronic","value":"9783642351303"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-35130-3_9","type":"book-chapter","created":{"date-parts":[[2012,12,10]],"date-time":"2012-12-10T07:09:45Z","timestamp":1355123385000},"page":"119-133","source":"Crossref","is-referenced-by-count":4,"title":["ProtoLeaks: A Reliable and Protocol-Independent Network Covert Channel"],"prefix":"10.1007","author":[{"given":"Arne","family":"Swinnen","sequence":"first","affiliation":[]},{"given":"Raoul","family":"Strackx","sequence":"additional","affiliation":[]},{"given":"Pieter","family":"Philippaerts","sequence":"additional","affiliation":[]},{"given":"Frank","family":"Piessens","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"9_CR1","unstructured":"National Computer Security Center, US DoD. Trusted Computer System Evaluation Criteria. Tech. Rep. DOD 5200.28-STD (1985)"},{"issue":"3","key":"9_CR2","doi-asserted-by":"publisher","first-page":"44","DOI":"10.1109\/COMST.2007.4317620","volume":"9","author":"S. Zander","year":"2007","unstructured":"Zander, S., Armitage, G., Branch, P.: A Survey of Covert Channels and Countermeasures in Computer Network Protocols. IEEE Communications Surveys and Tutorials\u00a09(3), 44\u201357 (2007)","journal-title":"IEEE Communications Surveys and Tutorials"},{"key":"9_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1007\/3-540-36415-3_2","volume-title":"Information Hiding","author":"G. Fisk","year":"2003","unstructured":"Fisk, G., Fisk, M., Papadopoulos, C., Neil, J.: Eliminating Steganography in Internet Traffic with Active Wardens. In: Petitcolas, F.A.P. (ed.) IH 2002. LNCS, vol.\u00a02578, pp. 18\u201335. Springer, Heidelberg (2003)"},{"key":"9_CR4","unstructured":"E\u00dfer, H., Freiling, F.: Kapazit\u00e4tsmessung eines verdeckten Zeitkanals \u00fcber HTTP. Tech. Rep. TR-2005-10 (2005)"},{"key":"9_CR5","unstructured":"Shah, G., Molina, A., Blaze, M.: Keyboards and covert channels. In: Proc. 15th Conf. USENIX Security Symposium (2006)"},{"key":"9_CR6","doi-asserted-by":"crossref","unstructured":"Luo, X., Zhou, P., Chan, E.W.W., Chang, R.K.C., Lee, W.: A Combinatorial Approach to Network Covert Communications with Applications in Web Leaks. In: Proceedings of the IEEE\/IFIP International Conference on Dependable Systems and Networks, DSN (2011)","DOI":"10.1109\/DSN.2011.5958260"},{"key":"9_CR7","doi-asserted-by":"crossref","unstructured":"El-Atawy, A., Al-Shaer, E.: Building Covert Channels over the Packet Reordering Phenomenon. In: IEEE INFOCOM 2009 (2009)","DOI":"10.1109\/INFCOM.2009.5062143"},{"key":"9_CR8","doi-asserted-by":"publisher","first-page":"281","DOI":"10.1016\/S0020-0190(01)00141-7","volume":"79","author":"W. Myrvold","year":"2000","unstructured":"Myrvold, W., Ruskey, F.: Ranking and unranking permutations in linear time. Information Processing Letters\u00a079, 281\u2013284 (2000)","journal-title":"Information Processing Letters"},{"key":"9_CR9","doi-asserted-by":"crossref","unstructured":"Hartigan, J.A., Wong, M.A.: Algorithm AS 136: A k-means clustering algorithm. Journal of the Royal Statistical Society. Series C (Applied Statistics) (1979)","DOI":"10.2307\/2346830"},{"key":"9_CR10","doi-asserted-by":"crossref","unstructured":"Rousseeuw, P.J.: Silhouettes: A graphical aid to the interpretation and validation of cluster analysis. Journal of Computational and Applied Mathematics\u00a020 (1987)","DOI":"10.1016\/0377-0427(87)90125-7"},{"key":"9_CR11","unstructured":"Danzig, P.B., Jamin, S.: tcplib: A library of internetwork traffic characteristics. Tech. rep. (1991)"},{"key":"9_CR12","doi-asserted-by":"crossref","unstructured":"Shiravi, A., Shiravi, H., Tavallaee, M., Ghorbani, A.A.: Toward developing a systematic approach to generate benchmark datasets for intrusion detection (2012)","DOI":"10.1016\/j.cose.2011.12.012"},{"key":"9_CR13","unstructured":"Gianvecchio, S., Wang, H., Wijesekera, D., Jajodia, S.: Model-based covert timing channels: Automated modeling and evasion (2008)"},{"key":"9_CR14","doi-asserted-by":"crossref","unstructured":"Cabuk, S., Brodley, C.E., Shields, C.: IP Covert Timing Channels: Design and Detection. In: Proc. 11th ACM Conf. Computer and Communications Security, CCS, pp. 178\u2013187 (2004)","DOI":"10.1145\/1030083.1030108"},{"key":"9_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"283","DOI":"10.1007\/978-3-540-74835-9_19","volume-title":"Computer Security \u2013 ESORICS 2007","author":"X. Luo","year":"2007","unstructured":"Luo, X., Chan, E.W.W., Chang, R.K.C.: Cloak: A Ten-Fold Way for Reliable Covert Communications. In: Biskup, J., L\u00f3pez, J. (eds.) ESORICS 2007. LNCS, vol.\u00a04734, pp. 283\u2013298. Springer, Heidelberg (2007)"},{"key":"9_CR16","doi-asserted-by":"crossref","unstructured":"Khan, H., Javed, Y., Mirza, F., Khayam, S.A.: Embedding a Covert Channel in Active Network Connections. In: IEEE Global Telecommunications Conference (2009)","DOI":"10.1109\/GLOCOM.2009.5425348"}],"container-title":["Lecture Notes in Computer Science","Information Systems Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-35130-3_9.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,4]],"date-time":"2021-05-04T13:09:55Z","timestamp":1620133795000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-35130-3_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642351297","9783642351303"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-35130-3_9","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2012]]}}}