{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T01:47:55Z","timestamp":1725587275656},"reference-count":19,"publisher":"IEEE","license":[{"start":{"date-parts":[[2020,11,16]],"date-time":"2020-11-16T00:00:00Z","timestamp":1605484800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2020,11,16]],"date-time":"2020-11-16T00:00:00Z","timestamp":1605484800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2020,11,16]],"date-time":"2020-11-16T00:00:00Z","timestamp":1605484800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020,11,16]]},"DOI":"10.1109\/lcn48667.2020.9314836","type":"proceedings-article","created":{"date-parts":[[2021,1,15]],"date-time":"2021-01-15T21:00:57Z","timestamp":1610744457000},"page":"437-440","source":"Crossref","is-referenced-by-count":1,"title":["Leveraging a Music Streaming Platform in Establishing a Novel Storage Covert Channel"],"prefix":"10.1109","author":[{"given":"Connor","family":"Egbert","sequence":"first","affiliation":[]},{"given":"Fawaz","family":"Alhenaki","sequence":"additional","affiliation":[]},{"given":"Daryl","family":"Johnson","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/PST.2008.26"},{"key":"ref11","first-page":"147","article-title":"Covert channels in ipv6","author":"lucena","year":"2005","journal-title":"International Workshop on Privacy Enhancing Technologies"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-51754-5_33"},{"article-title":"New covert channels in http","year":"2004","author":"bauer","key":"ref13"},{"article-title":"Average word length dynamics as indicator of cultural changes in society","year":"2012","author":"bochkarev","key":"ref14"},{"key":"ref15","first-page":"56","article-title":"Covert channels in the http network protocol: Channel characterization and detecting man-in-the-middle attacks","author":"brown","year":"2010","journal-title":"The Proceedings of the 5th International Conference on information warfare and security (ICIW2010)"},{"key":"ref16","first-page":"311","article-title":"Behavior-based covert channel in cyberspace","author":"johnson","year":"2010","journal-title":"Intelligent Decision Making Systems"},{"key":"ref17","article-title":"Department of defense trusted computer system evaluation criteria","author":"latham","year":"1986","journal-title":"Department of Defense"},{"journal-title":"A guide to understanding covert channel analysis of trusted systems","year":"1994","author":"gligor","key":"ref18"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/45.913211"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/CCNC.2016.7444898"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2007.4317620"},{"key":"ref6","first-page":"179","article-title":"Leveraging public posts and comments as covert channels","author":"dearstyne","year":"2014","journal-title":"Systems Signals and Image Processing (IWSSIP) 2014 International Conference on"},{"year":"2018","key":"ref5","article-title":"Spotify company info"},{"article-title":"Network-aware active wardens in ipv6","year":"2011","author":"lewandowski","key":"ref8"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/LCN.2008.4664172"},{"key":"ref2","article-title":"Covert channels","author":"couture","year":"2010","journal-title":"SANS Institute"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/362375.362389"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/CRISIS.2008.4757487"}],"event":{"name":"2020 IEEE 45th Conference on Local Computer Networks (LCN)","start":{"date-parts":[[2020,11,16]]},"location":"Sydney, NSW, Australia","end":{"date-parts":[[2020,11,19]]}},"container-title":["2020 IEEE 45th Conference on Local Computer Networks (LCN)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9314696\/9314766\/09314836.pdf?arnumber=9314836","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,28]],"date-time":"2022-06-28T21:58:23Z","timestamp":1656453503000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9314836\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,11,16]]},"references-count":19,"URL":"https:\/\/doi.org\/10.1109\/lcn48667.2020.9314836","relation":{},"subject":[],"published":{"date-parts":[[2020,11,16]]}}}