{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,28]],"date-time":"2025-08-28T12:55:37Z","timestamp":1756385737868,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":12,"publisher":"Springer Nature Singapore","isbn-type":[{"type":"print","value":"9789811964138"},{"type":"electronic","value":"9789811964145"}],"license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023]]},"DOI":"10.1007\/978-981-19-6414-5_10","type":"book-chapter","created":{"date-parts":[[2023,3,7]],"date-time":"2023-03-07T19:03:58Z","timestamp":1678215838000},"page":"169-189","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Near-Ultrasonic Covert Channels Using Software-Defined Radio Techniques"],"prefix":"10.1007","author":[{"given":"R.","family":"Sherry","sequence":"first","affiliation":[]},{"given":"E.","family":"Bayne","sequence":"additional","affiliation":[]},{"given":"D.","family":"McLuskie","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,3,8]]},"reference":[{"key":"10_CR1","unstructured":"The Council of Economic Advisers: The Cost of Malicious Cyber Activity to the U.S. Economy. No. February, pp. 1\u201362, 2018. [Online]. Available: https:\/\/www.fbi.gov\/investigate\/cyber%0A. https:\/\/www.whitehouse.gov\/wpcontent\/uploads\/2018\/02\/The-Cost-of-Malicious-Cyber-Activity-to-the-U.S.-Economy.pdf"},{"key":"10_CR2","doi-asserted-by":"publisher","unstructured":"Lampson, B.: A note on the confinement problem. Commun. ACM 16(10), 613\u2013615 (1973). [Online]. Available: https:\/\/doi.org\/10.1145\/362375.362389","DOI":"10.1145\/362375.362389"},{"key":"10_CR3","unstructured":"GNU Radio Project. [Online]. Available: https:\/\/www.gnuradio.org\/about\/"},{"key":"10_CR4","doi-asserted-by":"publisher","unstructured":"Ashihara, K.: Hearing thresholds for pure tones above 16 kHz. J. Acoust. Soc. Am. 122(3), EL52. [Online]. Available: https:\/\/doi.org\/10.1121\/1.2761883","DOI":"10.1121\/1.2761883"},{"key":"10_CR5","doi-asserted-by":"crossref","unstructured":"Hanspach, M., Goetz, M.: On covert acoustical mesh networks in air. J. Commun. 8(11), 758\u2013767. [Online]. Available: https:\/\/arxiv.org\/abs\/1406.1213v1","DOI":"10.12720\/jcm.8.11.758-767"},{"key":"10_CR6","unstructured":"Deshotels, L.: Inaudible sound as a covert channel in mobile devices. In 8th USENIX Workshop on Offensive Technologies (WOOT 14). San Diego, CA: USENIX Association, Aug. 2014. [Online]. Available: https:\/\/www.usenix.org\/conference\/woot14\/workshopprogram\/presentation\/deshotels"},{"key":"10_CR7","doi-asserted-by":"publisher","unstructured":"Carrara, B., Adams, C.: On characterizing and measuring out-of-band covert channels. In IH and MMSec 2015\u2014Proceedings of the 2015 ACM Workshop on Information Hiding and Multimedia Security, pp. 43\u201354 (2015). [Online]. Available: https:\/\/doi.org\/10.1145\/2756601.2756604","DOI":"10.1145\/2756601.2756604"},{"key":"10_CR8","unstructured":"Wong, W. I.: Crossing the air gap\u2014an ultrasonic covert channel. Thesis, Royal Military College of Canada (2018)"},{"key":"10_CR9","unstructured":"Smye, A.: An Introduction to Ultrasound Security Research. NCCGroup, Tech.Rep., Jul 2020. [Online]. Available: https:\/\/research.nccgroup.com\/wp-content\/uploads\/2020\/07\/ultrasoundwhitepaper-v1.0.pdf"},{"key":"10_CR10","unstructured":"Zarandy, A., Shumailov, I., Anderson, R.: BatNet: Data Transmission Between Smartphones Over Ultrasound. Aug 2020. [Online]. Available: https:\/\/arxiv.org\/pdf\/2008.00136.pdf"},{"key":"10_CR11","unstructured":"NGHam. [Online]. Available: https:\/\/github.com\/skagmo\/ngham"},{"key":"10_CR12","doi-asserted-by":"publisher","unstructured":"Smagowska, B., Pawlaczyk-Luszczy\u0144ska, M.: Effects of ultrasonic noise on the human body\u2014a bibliographic review. Int. J. Occup. Saf. Ergon. 19(2), 195\u2013202, (2015). [Online]. Available: https:\/\/www.tandfonline.com\/doi\/abs\/https:\/\/doi.org\/10.1080\/10803548.2013.11076978","DOI":"10.1080\/10803548.2013.11076978"}],"container-title":["Springer Proceedings in Complexity","Proceedings of the International Conference on Cybersecurity, Situational Awareness and Social Media"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-19-6414-5_10","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,3,27]],"date-time":"2023-03-27T13:05:22Z","timestamp":1679922322000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-19-6414-5_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"ISBN":["9789811964138","9789811964145"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/978-981-19-6414-5_10","relation":{},"ISSN":["2213-8684","2213-8692"],"issn-type":[{"type":"print","value":"2213-8684"},{"type":"electronic","value":"2213-8692"}],"subject":[],"published":{"date-parts":[[2023]]},"assertion":[{"value":"8 March 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}