{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,14]],"date-time":"2024-09-14T01:13:44Z","timestamp":1726276424406},"reference-count":49,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"1","license":[{"start":{"date-parts":[[2013,2,1]],"date-time":"2013-02-01T00:00:00Z","timestamp":1359676800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE J. Sel. Top. Signal Process."],"published-print":{"date-parts":[[2013,2]]},"DOI":"10.1109\/jstsp.2012.2237378","type":"journal-article","created":{"date-parts":[[2013,1,1]],"date-time":"2013-01-01T19:02:48Z","timestamp":1357066968000},"page":"124-136","source":"Crossref","is-referenced-by-count":15,"title":["Engineering Statistical Behaviors for Attacking and Defending Covert Channels"],"prefix":"10.1109","volume":"7","author":[{"given":"Valentino","family":"Crespi","sequence":"first","affiliation":[]},{"given":"George","family":"Cybenko","sequence":"additional","affiliation":[]},{"given":"Annarita","family":"Giani","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1117\/12.670123"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-30195-0_16"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1214\/aop\/1176988736"},{"key":"ref32","author":"sadasivam","year":"2011","journal-title":"Graph-based decoders and divergence-rate estimators for data-hiding problems"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1145\/195058.195155"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1007\/BF00992677"},{"key":"ref37","first-page":"185","article-title":"Learning deterministic linear languages","volume":"2375","author":"de la higuera","year":"2002","journal-title":"Lecture Notes in Computer ScienceLecture Notes in Artificial Intelligence"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2005.147"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2005.147"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1145\/1456377.1456382"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2011.2132490"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1016\/j.laa.2005.11.012"},{"key":"ref29","volume":"17","author":"teh","year":"2005","journal-title":"Hierarchical Dirichlet Processes"},{"key":"ref2","author":"cole","year":"2003","journal-title":"Hiding in Plain Sight Steganography and the Art of Covert Communication"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1201\/1079\/43263.28.6.20001201\/30373.5"},{"key":"ref20","article-title":"Anagram: A content anomaly detector resistant to mimicry attack","volume":"4219","author":"stolfo","year":"2006","journal-title":"Springer Lecture Notes in Computer Science Recent Advances in Intrusion Detection"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/18.669425"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/CMPASS.1994.318449"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2002.1003838"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2008.05.004"},{"key":"ref26","article-title":"Approximate nonnegative matrix factorization via alternating minimization","author":"finesso","year":"2004","journal-title":"Proc Math Theory of Netw Syst"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/5.18626"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/11556992_37"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-14706-7_9"},{"key":"ref40","author":"jelinek","year":"1997","journal-title":"Statistical Methods for Speech Recognition"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/THS.2010.5654967"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/1315245.1315284"},{"key":"ref14","article-title":"Embedding covert channels into TCP\/IP","author":"murdoch","year":"2005","journal-title":"Proc 7th Inf Hiding Workshop"},{"key":"ref15","first-page":"323","article-title":"Defending against statistical steganalysis","volume":"10","author":"provos","year":"2001","journal-title":"Proc 10th Usenix Security Symp"},{"key":"ref16","article-title":"Detection of covert channel encoding in network packet delays","author":"berk","year":"2005","journal-title":"Proc FloCon '05"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/WIFS.2010.5711459"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1002\/0471200611"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/1030083.1030108"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/362375.362389"},{"key":"ref3","first-page":"1","author":"kahn","year":"1996","journal-title":"Information Hiding"},{"key":"ref6","article-title":"Attacking and defending covert channels and behavioral models","volume":"abs 1104 5071","author":"crespi","year":"2011","journal-title":"CoRR"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1515\/9783110908589"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/49.668971"},{"key":"ref7","article-title":"A guide to understanding covert channel analysis of trusted systems","year":"1993","journal-title":"National Computer Security Center"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1089\/106652700750050844"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/357369.357374"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1145\/180139.181006"},{"key":"ref45","article-title":"The power of amnesia","volume":"6","author":"ron","year":"1993","journal-title":"Adv in Neural Inf Process Syst"},{"key":"ref48","first-page":"437","article-title":"PAC-learnability of probabilistic deterministic finite state automata","volume":"5","author":"clark","year":"2004","journal-title":"J Mach Learn Res"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1016\/j.tcs.2007.07.023"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1016\/S0065-2458(03)60002-1"},{"key":"ref41","author":"papadimitriou","year":"1998","journal-title":"Combinatorial Optimization Algorithms and Complexity"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2002.801405"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2002.1023788"}],"container-title":["IEEE Journal of Selected Topics in Signal Processing"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/4200690\/6416927\/06400212.pdf?arnumber=6400212","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,12,23]],"date-time":"2021-12-23T04:01:54Z","timestamp":1640232114000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6400212\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,2]]},"references-count":49,"journal-issue":{"issue":"1"},"URL":"https:\/\/doi.org\/10.1109\/jstsp.2012.2237378","relation":{},"ISSN":["1932-4553","1941-0484"],"issn-type":[{"value":"1932-4553","type":"print"},{"value":"1941-0484","type":"electronic"}],"subject":[],"published":{"date-parts":[[2013,2]]}}}