{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,27]],"date-time":"2025-10-27T20:43:58Z","timestamp":1761597838551},"reference-count":15,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,6]]},"DOI":"10.1109\/iwcmc.2017.7986439","type":"proceedings-article","created":{"date-parts":[[2017,7,20]],"date-time":"2017-07-20T20:38:06Z","timestamp":1500583086000},"page":"1102-1107","source":"Crossref","is-referenced-by-count":5,"title":["Using MapReduce and hierarchical entropy analysis to speed-up the detection of covert timing channels"],"prefix":"10.1109","author":[{"given":"Omar","family":"Darwish","sequence":"first","affiliation":[]},{"given":"Ala","family":"Al-Fuqaha","sequence":"additional","affiliation":[]},{"given":"Ghassen","family":"Ben Brahim","sequence":"additional","affiliation":[]},{"given":"Muhamad Awais","family":"Javed","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","first-page":"541","author":"gui","year":"2013","journal-title":"Finding Needles in a Haystack Reducing False Alarm Rate Using Telemedicine Mobile Cloud"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2015.2423680"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/CNS.2015.7346833"},{"key":"ref13","first-page":"541","article-title":"Detecting covert timing channels with time-deterministic replay","author":"chen","year":"2014","journal-title":"11 th USENIX Symposium on Operating Systems Design and Implementation (OSDI 14)"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/IWCMC.2015.7289074"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/EIConRus.2017.7910590"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/1030083.1030108"},{"journal-title":"An Insight to Covert Channels","year":"2013","author":"salwan","key":"ref3"},{"key":"ref6","article-title":"MapReduce: Simplified Data Processing on Large Clusters","author":"dean","year":"2004","journal-title":"Proceedings of the Operating Systems Design and Implementation Symposium"},{"key":"ref5","first-page":"79","author":"huang","year":"2015","journal-title":"Towards Model Based Approach to Hadoop Deployment and Configuration"},{"key":"ref8","first-page":"315","author":"leung","year":"2014","journal-title":"Reducing the Search Space for Big Data Mining for Interesting Patterns from Uncertain Data"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/GrC.2013.6740378"},{"key":"ref2","article-title":"Network covert channels: Review of current state and analysis of viability of the use of x. 509 certificates for covert communications","author":"scott","year":"2008","journal-title":"Technical Report Department of Mathematics-University of London"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/CTS.2013.6567202"},{"key":"ref9","first-page":"421","author":"zimmermann","year":"2010","journal-title":"Searching for a Needle in a Haystack Predicting Security Vulnerabilities for Windows Vista"}],"event":{"name":"2017 13th International Wireless Communications and Mobile Computing Conference (IWCMC)","start":{"date-parts":[[2017,6,26]]},"location":"Valencia, Spain","end":{"date-parts":[[2017,6,30]]}},"container-title":["2017 13th International Wireless Communications and Mobile Computing Conference (IWCMC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7975134\/7986245\/07986439.pdf?arnumber=7986439","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,8,16]],"date-time":"2017-08-16T15:44:02Z","timestamp":1502898242000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7986439\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,6]]},"references-count":15,"URL":"https:\/\/doi.org\/10.1109\/iwcmc.2017.7986439","relation":{},"subject":[],"published":{"date-parts":[[2017,6]]}}}