{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,23]],"date-time":"2026-03-23T10:32:44Z","timestamp":1774261964155,"version":"3.50.1"},"reference-count":27,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009,3]]},"DOI":"10.1109\/ia.2009.4927510","type":"proceedings-article","created":{"date-parts":[[2009,5,19]],"date-time":"2009-05-19T15:55:12Z","timestamp":1242748512000},"page":"128-135","source":"Crossref","is-referenced-by-count":5,"title":["Information leakage detection in distributed systems using software agents"],"prefix":"10.1109","author":[{"given":"Yung-Chuan","family":"Lee","sequence":"first","affiliation":[]},{"given":"Stephen","family":"Bishop","sequence":"additional","affiliation":[]},{"given":"Hamed","family":"Okhravi","sequence":"additional","affiliation":[]},{"given":"Shahram","family":"Rahimi","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","article-title":"national computer security center","year":"1993","journal-title":"A guide to understanding covert channel analysis of trusted systems"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1109\/CSFW.1991.151588"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.1999.766906"},{"key":"15","author":"meerwald","year":"0"},{"key":"16","article-title":"2006 global security survey, research report","author":"melek","year":"2006","journal-title":"Deloitte"},{"key":"13","first-page":"1168","article-title":"a covert channel in mac protocols based on splitting algorithms","volume":"2","author":"li","year":"2005","journal-title":"IEEE Wireless Commun Networking Conf WCNC 99"},{"key":"14","article-title":"kernel korner: intro to inotify","volume":"8","author":"love","year":"2005","journal-title":"Linux Journal"},{"key":"11","doi-asserted-by":"crossref","first-page":"352","DOI":"10.1109\/CSAC.2005.56","article-title":"the pump: a decade of covert fun","author":"kang","year":"2005","journal-title":"Proceedings of the 21st Annual Computer Security Applications Conference"},{"key":"12","author":"kowalski","year":"2008","journal-title":"Insider Threat Study Illicit Cyber Activity in the Information Technology and Telecommunications Sector"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1109\/CCST.2004.1405390"},{"key":"20","author":"okhravi","year":"2008","journal-title":"Colored Linux Covert Channel Resistant OS Information Flow Security"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1109\/SECUREWARE.2007.4385310"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1109\/ISA.2008.42"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.1109\/32.55086"},{"key":"25","doi-asserted-by":"publisher","DOI":"10.1109\/IAW.2004.1437799"},{"key":"26","first-page":"473","article-title":"covert and side channels due to processor architecture","author":"wang","year":"2006","journal-title":"Proceedings - Annual Computer Security Applications Conference ACSAC"},{"key":"27","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2007.4395378"},{"key":"3","year":"2006","journal-title":"Network Covert Channels Design Analysis Detection and Elimination"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1109\/SECURWARE.2008.14"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/32.502225"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1145\/1409540.1409592"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP.1998.723406"},{"key":"6","first-page":"1711","volume":"36","author":"chen","year":"2006","journal-title":"Mobile-C A Mobile Agent Platform for Mobile C-C++ Agents"},{"key":"5","first-page":"128","volume":"3483","author":"chang","year":"2005","journal-title":"Design of Inside Information Leakage Prevention System in Ubiquitous Computing Environment"},{"key":"4","doi-asserted-by":"crossref","first-page":"178","DOI":"10.1145\/1030083.1030108","article-title":"ip covert timing channels: design and detection","author":"cabuk","year":"2004","journal-title":"Proceedings of the ACM Conference on Computer and Communications Security"},{"key":"9","doi-asserted-by":"crossref","first-page":"307","DOI":"10.1145\/1315245.1315284","article-title":"detecting covert timing channels: an entropy-based approach","author":"gianvecchio","year":"2007","journal-title":"Proceedings of the 14th ACM conference on Computer and Communications Security"},{"key":"8","article-title":"fipa communicative act library specification","year":"2000","journal-title":"Foundation for intelligent physical agents"}],"event":{"name":"2009 IEEE Symposium on Intelligent Agents (IA)","location":"Nashville, TN, USA","start":{"date-parts":[[2009,3,30]]},"end":{"date-parts":[[2009,4,2]]}},"container-title":["2009 IEEE Symposium on Intelligent Agents"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/4911322\/4927488\/04927510.pdf?arnumber=4927510","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,10,5]],"date-time":"2021-10-05T19:07:06Z","timestamp":1633460826000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/4927510\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,3]]},"references-count":27,"URL":"https:\/\/doi.org\/10.1109\/ia.2009.4927510","relation":{},"subject":[],"published":{"date-parts":[[2009,3]]}}}