{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:29:31Z","timestamp":1750220971119,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":20,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,8,26]],"date-time":"2019-08-26T00:00:00Z","timestamp":1566777600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,8,26]]},"DOI":"10.1145\/3339252.3341477","type":"proceedings-article","created":{"date-parts":[[2019,8,9]],"date-time":"2019-08-09T12:21:03Z","timestamp":1565353263000},"page":"1-8","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Protocol-independent Detection of \"Messaging Ordering\" Network Covert Channels"],"prefix":"10.1145","author":[{"given":"Steffen","family":"Wendzel","sequence":"first","affiliation":[{"name":"Worms University of Applied Science, Centre of Technology and Transfer (ZTT), Worms, Germany, Fraunhofer FKIE, Department of Cyber Security, Bonn, Germany"}]}],"member":"320","published-online":{"date-parts":[[2019,8,26]]},"reference":[{"volume-title":"Proc. Workshop on Multimedia Security at ACM Multimedia","year":"2002","author":"Ahsan Kamran","key":"e_1_3_2_1_1_1"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/3230833.3233264"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/1030083.1030108"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/1513601.1513604"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSEC.2019.2898636"},{"volume-title":"10th USENIX Security Symposium.","year":"2001","author":"Handley Mark","key":"e_1_3_2_1_6_1"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"crossref","unstructured":"Stefan Katzenbeisser and Fabien A. Petitcolas (Eds.). 2000. Information Hiding Techniques for Steganography and Digital Watermarking (1st ed.). Artech House Inc. Norwood MA USA.   Stefan Katzenbeisser and Fabien A. Petitcolas (Eds.). 2000. Information Hiding Techniques for Steganography and Digital Watermarking (1st ed.). Artech House Inc. Norwood MA USA.","DOI":"10.1201\/1079\/43263.28.6.20001201\/30373.5"},{"volume-title":"Security, Steganography, and Watermarking of Multimedia Contents IX.","series-title":"SPIE Proceedings","author":"Kraetzer Christian","key":"e_1_3_2_1_8_1"},{"key":"e_1_3_2_1_9_1","unstructured":"Deepa Kundur and Kamran Ahsan. 2003. Practical Internet steganography: data hiding in IP. (2003).  Deepa Kundur and Kamran Ahsan. 2003. Practical Internet steganography: data hiding in IP. (2003)."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2015.33"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2014.2350994"},{"volume-title":"Mechanisms, Applications, and Countermeasures","author":"Mazurczyk Wojciech","key":"e_1_3_2_1_12_1"},{"volume-title":"Covert Channels in TCP\/IP Protocol Stack. ICT innovations web proceedings","year":"2013","author":"Panajotov Boris","key":"e_1_3_2_1_13_1"},{"key":"e_1_3_2_1_14_1","first-page":"1","article-title":"Sending hidden data through WWW pages: detection and prevention","volume":"58","author":"Polak Lukasz","year":"2010","journal-title":"Engineering Transactions"},{"key":"e_1_3_2_1_15_1","unstructured":"CUING Project. 2019. Criminal Use of Information Hiding Project Website. http:\/\/www.cuing.org.  CUING Project. 2019. Criminal Use of Information Hiding Project Website. http:\/\/www.cuing.org."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/3230833.3233266"},{"volume-title":"One Countermeasure","year":"2018","author":"Wendzel Steffen","key":"e_1_3_2_1_17_1"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/2684195"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2007.4317620"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-03638-6_13"}],"event":{"name":"ARES '19: 14th International Conference on Availability, Reliability and Security","acronym":"ARES '19","location":"Canterbury CA United Kingdom"},"container-title":["Proceedings of the 14th International Conference on Availability, Reliability and Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3339252.3341477","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3339252.3341477","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:54:29Z","timestamp":1750204469000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3339252.3341477"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,8,26]]},"references-count":20,"alternative-id":["10.1145\/3339252.3341477","10.1145\/3339252"],"URL":"https:\/\/doi.org\/10.1145\/3339252.3341477","relation":{},"subject":[],"published":{"date-parts":[[2019,8,26]]},"assertion":[{"value":"2019-08-26","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}