{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,14]],"date-time":"2024-09-14T01:11:28Z","timestamp":1726276288249},"reference-count":11,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010,12]]},"DOI":"10.1109\/wifs.2010.5711441","type":"proceedings-article","created":{"date-parts":[[2011,2,11]],"date-time":"2011-02-11T18:09:17Z","timestamp":1297447757000},"page":"1-6","source":"Crossref","is-referenced-by-count":9,"title":["A phase-space reconstruction approach to detect covert channels in TCP\/IP protocols"],"prefix":"10.1109","author":[{"given":"Hong","family":"Zhao","sequence":"first","affiliation":[]},{"given":"Yun Q.","family":"Shi","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref4","doi-asserted-by":"crossref","first-page":"313","DOI":"10.1007\/978-3-540-39927-8_29","article-title":"A study on covert channel detection of TCP\/IP header using support vector machine","author":"sohn","year":"2003","journal-title":"Proc 5th Interational Conference Information and Communication Security (ICICS'03)"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/SADFE.2005.21"},{"journal-title":"Strange Attractors and TCP Sequence Number Analysis","year":"0","author":"zalewski","key":"ref10"},{"article-title":"Covert channel analysis and data hiding in TCP\/IP","year":"2002","author":"ahsan","key":"ref6"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.5210\/fm.v2i5.528"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/1513601.1513604"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/FSKD.2008.423"},{"key":"ref7","article-title":"Practical data hidding in TCP\/IP","author":"ahsan","year":"2002","journal-title":"Workshop on Multimedia Security at ACM Multimedia"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2007.4317620"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevLett.45.712"},{"journal-title":"Trusted Computer System Evaluation","year":"1985","author":"attallah","key":"ref1"}],"event":{"name":"2010 IEEE International Workshop on Information Forensics and Security (WIFS)","start":{"date-parts":[[2010,12,12]]},"location":"Seattle, WA, USA","end":{"date-parts":[[2010,12,15]]}},"container-title":["2010 IEEE International Workshop on Information Forensics and Security"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5707112\/5711434\/05711441.pdf?arnumber=5711441","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,8]],"date-time":"2019-06-08T10:19:40Z","timestamp":1559989180000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5711441\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,12]]},"references-count":11,"URL":"https:\/\/doi.org\/10.1109\/wifs.2010.5711441","relation":{},"subject":[],"published":{"date-parts":[[2010,12]]}}}