{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,27]],"date-time":"2025-10-27T20:36:42Z","timestamp":1761597402064},"reference-count":13,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012,10]]},"DOI":"10.1109\/lcn.2012.6423628","type":"proceedings-article","created":{"date-parts":[[2013,2,8]],"date-time":"2013-02-08T16:27:47Z","timestamp":1360340867000},"page":"280-283","source":"Crossref","is-referenced-by-count":21,"title":["Detecting protocol switching covert channels"],"prefix":"10.1109","author":[{"given":"Steffen","family":"Wendzel","sequence":"first","affiliation":[]},{"given":"Sebastian","family":"Zander","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Trusted Computer System Evaluation Criteria","year":"1985","key":"13"},{"key":"11","first-page":"267","author":"kohavi","year":"2002","journal-title":"Decision-tree Discovery Ch 16 1 3"},{"key":"12","article-title":"Data mining","author":"witten","year":"2005","journal-title":"Practical Machine Learning Tools and Techniques 2nd Ed"},{"key":"3","first-page":"1949","article-title":"Protocol channels as a new design alternative of covert channels","author":"wendzel","year":"2008","journal-title":"CoRR"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2007.4317620"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1145\/362375.362389"},{"journal-title":"Traffic Measurement Data Repository \"","year":"2009","key":"10"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/CSAC.2005.56"},{"key":"6","first-page":"18","article-title":"Eliminating steganography in internet traffic with active wardens","author":"fisk","year":"2003","journal-title":"Revised Papers from the 5th Int Workshop on Inf Hiding"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1145\/357369.357374"},{"key":"4","first-page":"178","article-title":"IP covert timing channels: Design and detection","author":"cabuk","year":"2004","journal-title":"ACM Conference on Computer and Communications Security"},{"year":"0","author":"wenzel","key":"9"},{"key":"8","first-page":"1","article-title":"Design and implementation of an active warden addressing protocol switching covert channels","author":"wendzel","year":"2012","journal-title":"Proc 7th Int Conf on Internet Monitoring and Protection (ICIMP)"}],"event":{"name":"2012 IEEE 37th Conference on Local Computer Networks (LCN 2012)","start":{"date-parts":[[2012,10,22]]},"location":"Clearwater Beach, FL, USA","end":{"date-parts":[[2012,10,25]]}},"container-title":["37th Annual IEEE Conference on Local Computer Networks"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6413535\/6423567\/06423628.pdf?arnumber=6423628","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,21]],"date-time":"2017-03-21T17:01:52Z","timestamp":1490115712000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6423628\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,10]]},"references-count":13,"URL":"https:\/\/doi.org\/10.1109\/lcn.2012.6423628","relation":{},"subject":[],"published":{"date-parts":[[2012,10]]}}}