{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,11]],"date-time":"2026-04-11T13:13:34Z","timestamp":1775913214016,"version":"3.50.1"},"reference-count":12,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009,6]]},"DOI":"10.1109\/icc.2009.5198826","type":"proceedings-article","created":{"date-parts":[[2009,8,11]],"date-time":"2009-08-11T16:20:30Z","timestamp":1250007630000},"page":"1-5","source":"Crossref","is-referenced-by-count":13,"title":["CLACK: A Network Covert Channel Based on Partial Acknowledgment Encoding"],"prefix":"10.1109","author":[{"given":"X.","family":"Luo","sequence":"first","affiliation":[]},{"given":"E. W. W.","family":"Chan","sequence":"additional","affiliation":[]},{"given":"R. K. C.","family":"Chang","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2003.822645"},{"key":"2","article-title":"web tap: detecting covert web traffic","author":"borders","year":"2004","journal-title":"Proc ACM CCS"},{"key":"10","article-title":"the implementation of passive covert channels in the linux kernel","author":"rutkowska","year":"2004","journal-title":"Proc Chaos Communication Congress"},{"key":"1","article-title":"practical data hiding in tcp\/ip","author":"ahsan","year":"2002","journal-title":"Proc ACM Workshop on Multimedia Security"},{"key":"7","article-title":"network intrusion detection: evasion, traffic normalization, and end-to-end protocol semantics","author":"handley","year":"2001","journal-title":"Proc Usenix Security Symposium"},{"key":"6","article-title":"covert messaging in tcp","author":"giffen","year":"2002","journal-title":"Proc PET"},{"key":"5","article-title":"hiding data in the osi network model","author":"handel","year":"1996","journal-title":"Proc IH"},{"key":"4","article-title":"eliminating steganography in internet traffic with active wardens","author":"fisk","year":"2002","journal-title":"Proc IH"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.5210\/fm.v2i5.528"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1145\/251007.251012"},{"key":"11","article-title":"ip covert timing channels: design and detection","author":"cabuk","year":"2004","journal-title":"Proc ACM CCS"},{"key":"12","article-title":"embedding covert channels into tcp\/ip","author":"murdoch","year":"2005","journal-title":"Proc IH"}],"event":{"name":"ICC 2009 - 2009 IEEE International Conference on Communications","location":"Dresden, Germany","start":{"date-parts":[[2009,6,14]]},"end":{"date-parts":[[2009,6,18]]}},"container-title":["2009 IEEE International Conference on Communications"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5198563\/5198564\/05198826.pdf?arnumber=5198826","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,17]],"date-time":"2017-03-17T13:09:07Z","timestamp":1489756147000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5198826\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,6]]},"references-count":12,"URL":"https:\/\/doi.org\/10.1109\/icc.2009.5198826","relation":{},"subject":[],"published":{"date-parts":[[2009,6]]}}}