{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,26]],"date-time":"2025-05-26T15:45:51Z","timestamp":1748274351410,"version":"3.28.0"},"reference-count":16,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,5]]},"DOI":"10.1109\/cscwd.2018.8465339","type":"proceedings-article","created":{"date-parts":[[2018,9,17]],"date-time":"2018-09-17T18:04:03Z","timestamp":1537207443000},"page":"872-877","source":"Crossref","is-referenced-by-count":1,"title":["An Entropy-based Method for Detection of Covert Channels over LTE"],"prefix":"10.1109","author":[{"given":"Zukui","family":"Wang","sequence":"first","affiliation":[]},{"given":"Liusheng","family":"Huang","sequence":"additional","affiliation":[]},{"given":"Wei","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Zhiqiang","family":"He","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","article-title":"Attacks with Steganography in PHY and MAC Layers of 802. 15. 4 Protocol","author":"martins","year":"2010","journal-title":"IEEE International Conference in System and Networks Communications"},{"key":"ref11","doi-asserted-by":"crossref","first-page":"273","DOI":"10.1109\/TIFS.2012.2231861","article-title":"Detecting Covert Channels in Computer Networks Based on Chaos Theory","author":"zhao","year":"2013","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"ref12","first-page":"802","article-title":"Network based detection of passive covert channels in TCP\/IP","author":"tumoian","year":"2005","journal-title":"Proc IEEE Conf Local Comput Netw"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/MINES.2009.296"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/MINES.2010.190"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/s004220050414"},{"journal-title":"Kernel-based regression and objective nonlinear measures to assess brain functioning","year":"2001","author":"rosipal","key":"ref16"},{"key":"ref4","article-title":"Analysis and Evaluation of Covert Channels over LTE-Advanced","author":"rezaei","year":"2013","journal-title":"IEEE Wireless Communications and Networking Conference (WCNC) NETWORKS"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2015.2423680"},{"key":"ref6","first-page":"785","article-title":"An Entropy-Based Approach to Detecting Covert Timing Channels","volume":"8","author":"gianvecchio","year":"2011","journal-title":"IEEE Computer Society Press"},{"key":"ref5","article-title":"Steganography in Long Term Evolution Systems","author":"grabska","year":"2014","journal-title":"IEEE Security and Privacy Workshops"},{"journal-title":"Evolved Universal Terrestrial Radio Access (E-UTRA) Radio Link Control (RLC) Protocol Specification (Release 8)","article-title":"3rd Generation Partnership Project, technical Specification Group Radio Access Network","year":"0","key":"ref8"},{"journal-title":"Evolved Universal Terrestrial Radio (E-UTRA) Physical layer procedures (Release 14)","article-title":"3rd Generation Partnership Project, Technical Specification Group Radio Access Network","year":"0","key":"ref7"},{"key":"ref2","first-page":"134","article-title":"Network Steganography","author":"lubacz","year":"2010","journal-title":"Telecommunication Review and telecommunication News in Polish"},{"key":"ref1","doi-asserted-by":"crossref","first-page":"613","DOI":"10.1145\/362375.362389","article-title":"A note to the confinement problem","author":"lampson","year":"1973","journal-title":"Communications of the ACM"},{"journal-title":"Evolved Universal Terrestrial Radio Access (E-UTRA) Packet Data Convergence Protocol (PDCP) Specification","article-title":"3rd Generation Partnership Project, Technical Specification Group Radio Access Network","year":"0","key":"ref9"}],"event":{"name":"2018 IEEE 22nd International Conference on Computer Supported Cooperative Work in Design (CSCWD)","start":{"date-parts":[[2018,5,9]]},"location":"Nanjing","end":{"date-parts":[[2018,5,11]]}},"container-title":["2018 IEEE 22nd International Conference on Computer Supported Cooperative Work in Design ((CSCWD))"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8455506\/8464758\/08465339.pdf?arnumber=8465339","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,10,19]],"date-time":"2018-10-19T18:49:33Z","timestamp":1539974973000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8465339\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,5]]},"references-count":16,"URL":"https:\/\/doi.org\/10.1109\/cscwd.2018.8465339","relation":{},"subject":[],"published":{"date-parts":[[2018,5]]}}}