{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,15]],"date-time":"2025-11-15T10:22:55Z","timestamp":1763202175585},"reference-count":25,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,6]]},"DOI":"10.1109\/iwcmc.2018.8450468","type":"proceedings-article","created":{"date-parts":[[2018,8,30]],"date-time":"2018-08-30T22:00:16Z","timestamp":1535666416000},"page":"255-260","source":"Crossref","is-referenced-by-count":7,"title":["Towards a Streaming Approach to the Mitigation of Covert Timing Channels"],"prefix":"10.1109","author":[{"given":"Omar","family":"Darwish","sequence":"first","affiliation":[]},{"given":"Ala","family":"Al-Fuqaha","sequence":"additional","affiliation":[]},{"given":"Ghassen Ben","family":"Brahim","sequence":"additional","affiliation":[]},{"given":"Ilyes","family":"Jenhani","sequence":"additional","affiliation":[]},{"given":"Muhammad","family":"Anan","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/IWCMC.2015.7289074"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/IWCMC.2017.7986439"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/GIIS.2009.5307102"},{"key":"ref13","first-page":"420","article-title":"TCP covert timing channels: Design and detection","author":"luo","year":"2008","journal-title":"2008 IEEE International Conference on Dependable Systems and Networks With FTCS and DCC (DSN) DSN"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/CNS.2015.7346911"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2011.2163398"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2014.2346504"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCN.2016.7568479"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/HPCA.2017.36"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/1866307.1866341"},{"key":"ref4","article-title":"Covert Channel Detection and Analysis System Based on Data Mining","author":"wang","year":"0","journal-title":"Research Center of Computer Network and Information Security Technology"},{"key":"ref3","article-title":"A Pattern-based Survey and Categorization of Network Covert Channel Techniques","author":"wendzel","year":"2014","journal-title":"arXiv 1406 2901 [cs]"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/ISI.2015.7165963"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2015.2423680"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/CNS.2015.7346833"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2010.46"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/LCN.2012.6423628"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/1030083.1030108"},{"key":"ref1","article-title":"Network Covert Channels: Review of Current State and Analysis of Viability of the use of X.509 Certificates for Covert Communications","author":"scott","year":"2008","journal-title":"Technical Report RHUL-MA-2008-11"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/2046707.2046772"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/ICCSCE.2012.6487177"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/2254064.2254078"},{"journal-title":"Na&#x00EF;ve bayes classifier","year":"0","key":"ref24"},{"journal-title":"Support vector machine original","year":"0","key":"ref23"},{"journal-title":"C4 5 Programsfor Machine Learning","year":"1993","author":"ross quinlan","key":"ref25"}],"event":{"name":"2018 14th International Wireless Communications & Mobile Computing Conference (IWCMC)","start":{"date-parts":[[2018,6,25]]},"location":"Limassol","end":{"date-parts":[[2018,6,29]]}},"container-title":["2018 14th International Wireless Communications &amp; Mobile Computing Conference (IWCMC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8410977\/8450266\/08450468.pdf?arnumber=8450468","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,26]],"date-time":"2022-01-26T15:57:39Z","timestamp":1643212659000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8450468\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,6]]},"references-count":25,"URL":"https:\/\/doi.org\/10.1109\/iwcmc.2018.8450468","relation":{},"subject":[],"published":{"date-parts":[[2018,6]]}}}