{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,1]],"date-time":"2026-02-01T20:25:07Z","timestamp":1769977507980,"version":"3.49.0"},"reference-count":58,"publisher":"IEEE","license":[{"start":{"date-parts":[[2019,7,1]],"date-time":"2019-07-01T00:00:00Z","timestamp":1561939200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2019,7,1]],"date-time":"2019-07-01T00:00:00Z","timestamp":1561939200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2019,7,1]],"date-time":"2019-07-01T00:00:00Z","timestamp":1561939200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,7]]},"DOI":"10.1109\/hpcs48598.2019.9188115","type":"proceedings-article","created":{"date-parts":[[2020,9,9]],"date-time":"2020-09-09T16:58:33Z","timestamp":1599670713000},"page":"582-588","source":"Crossref","is-referenced-by-count":12,"title":["Detecting Selected Network Covert Channels Using Machine Learning"],"prefix":"10.1109","author":[{"given":"Mehdi","family":"Chourib","sequence":"first","affiliation":[]}],"member":"263","reference":[{"key":"ref39","article-title":"Feature learning in deep neural networks-studies on speech recognition tasks","author":"yu","year":"2013","journal-title":"arXiv preprint arXiv 1301 3605"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-40994-3_25"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1007\/11553595_6"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1007\/BF00153759"},{"key":"ref31","article-title":"Survey on the usage of machine learning techniques for malware analysis","author":"ucci","year":"2017","journal-title":"arXiv preprint arXiv 1710 08189"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1007\/s11235-013-9737-7"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.2139\/ssrn.1424949"},{"key":"ref36","doi-asserted-by":"crossref","first-page":"19","DOI":"10.1016\/j.jnca.2015.11.016","article-title":"A survey of network anomaly detection techniques","volume":"60","author":"mohiuddin","year":"2016","journal-title":"Journal of Network and Computer Applications"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2015.2423680"},{"key":"ref34","first-page":"222","volume":"43","author":"tsai","year":"2010","journal-title":"A triangle area based nearest neighbors approach to intrusion detection Pattern recognition"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/2684195"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2009.05.029"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2007.4317620"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1142\/S0218001403002460"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2013.052213.00046"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1162\/089976698300017575"},{"key":"ref22","article-title":"New intelligent heuristic algorithm to mitigate security vulnerabilities in ipv6","volume":"4","author":"salih","year":"2015","journal-title":"International Journal of Information Security"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.5210\/fm.v2i5.528"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2007.03.025"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1162\/089976601750264965"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/SAINT.2003.1183050"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-39737-3_103"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/ICICS.2009.5397551"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/NTMS.2008.ECP.101"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1201\/9781420067194"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1109\/THS.2010.5654967"},{"key":"ref56","author":"mazurczyk","year":"2016","journal-title":"Information Hiding in Communication Networks"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1109\/LCN.2012.6423628"},{"key":"ref54","doi-asserted-by":"crossref","DOI":"10.1007\/11558859_19","article-title":"Embedding covert channels into TCP\/IP","author":"murdoch","year":"2005","journal-title":"International Workshop on Information Hiding"},{"key":"ref53","author":"zander","year":"2006","journal-title":"Covert channels in the IP time to live field"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1109\/ARES.2006.114"},{"key":"ref10","article-title":"One class support vector machines for detecting anomalous windows registry accesses","volume":"9","author":"heller","year":"2003","journal-title":"Proc of the Workshop on Data Mining for Computer Security"},{"key":"ref11","first-page":"168174","article-title":"Robust support vector machines for anomaly detection in computer security","author":"hu","year":"2003","journal-title":"ICMLA"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2013.50"},{"key":"ref12","first-page":"431438","article-title":"Estimating the generalization performance of an svm efficiently","author":"joachims","year":"2000","journal-title":"Proc 17th International Conf on Machine Learning"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ICOIN.2013.6496342"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1126\/science.aaa8415"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/357369.357374"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2004.05.008"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2004.05.008"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/362375.362389"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2012.09.004"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/BF00994018"},{"key":"ref3","article-title":"I.T. R. Center","year":"2017","journal-title":"Data breach report"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/345508.345593"},{"key":"ref5","article-title":"Department of defense trusted computer system evaluation criteria","author":"latham donald","year":"1986","journal-title":"Department of Defense"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ICICS.2009.5397551"},{"key":"ref7","volume":"1","author":"fall","year":"2011","journal-title":"TCP\/IP Illustrated"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/MINES.2010.190"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.1987.233153"},{"key":"ref46","article-title":"Covert channels in IPv6","author":"lucena","year":"2005","journal-title":"International Workshop on Privacy Enhancing Technologies"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-21579-2_9"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1049\/iet-com.2010.0348"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2012.2231861"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1007\/11558859_19"},{"key":"ref41","article-title":"Detection of TCP\/IP Covert Channel based on Nave-Bayesian Classifier","author":"kumar","year":"2014","journal-title":"International Journal of Engineering and Computer Science ISSN 2319-7242"},{"key":"ref44","doi-asserted-by":"crossref","first-page":"712","DOI":"10.1016\/j.future.2018.12.047","article-title":"Countering Adaptive Network Covert Communication with Dynamic Wardens","volume":"94","author":"wojciech","year":"2019","journal-title":"Future Generation Computer Systems (FGCS)"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1145\/1513601.1513604"}],"event":{"name":"2019 International Conference on High Performance Computing & Simulation (HPCS)","location":"Dublin, Ireland","start":{"date-parts":[[2019,7,15]]},"end":{"date-parts":[[2019,7,19]]}},"container-title":["2019 International Conference on High Performance Computing &amp; Simulation (HPCS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9183768\/9188050\/09188115.pdf?arnumber=9188115","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,17]],"date-time":"2022-07-17T17:50:27Z","timestamp":1658080227000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9188115\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,7]]},"references-count":58,"URL":"https:\/\/doi.org\/10.1109\/hpcs48598.2019.9188115","relation":{},"subject":[],"published":{"date-parts":[[2019,7]]}}}