{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,24]],"date-time":"2026-02-24T18:15:21Z","timestamp":1771956921378,"version":"3.50.1"},"reference-count":17,"publisher":"Academy Publisher","issue":"6","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["JNW"],"DOI":"10.4304\/jnw.9.6.1440-1446","type":"journal-article","created":{"date-parts":[[2014,6,10]],"date-time":"2014-06-10T02:59:48Z","timestamp":1402369188000},"source":"Crossref","is-referenced-by-count":14,"title":["Network Packet Length Covert Channel Based on Empirical Distribution Function"],"prefix":"10.4304","volume":"9","author":[{"given":"Lihua","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Guangjie","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Yuewei","family":"Dai","sequence":"additional","affiliation":[]}],"member":"2838","published-online":{"date-parts":[[2014,6,9]]},"reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/362375.362389"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.1987.233153"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2008.09.010"},{"key":"ref4","article-title":"Bypassing firewalls: tools and techniques","volume-title":"12th Annual FIRST conference","author":"Hill","year":"2000","unstructured":"[4] Hill, J, \"Bypassing firewalls: tools and techniques,\" in 12th Annual FIRST conference, Chicago, IL, USA. 2000."},{"key":"ref5","volume-title":"Ola Nordstrom Chenghuai Lu Andre L M dos Santos \"Malicious ICMP tunneling","author":"Singh","year":"2003","unstructured":"[5] Singh, A., Ola Nordstrom, Chenghuai Lu, Andre L.M. dos Santos, \"Malicious ICMP tunneling: Defense against the vulnerability,\" in Information Security and Privacy. 2003. Springer."},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2007.4317620"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.5210\/fm.v2i5.528"},{"key":"ref8","first-page":"10","volume-title":"Covert channels in TCP and IP headers","author":"Hintz","year":"2002","unstructured":"[10] Hintz, A., \"Covert channels in TCP and IP headers,\" Presentation at DEFCON, 2002. 10."},{"key":"ref9","volume-title":"Covert Channel Based on the Delta Modulation of IPID","author":"Liu","year":"2010","unstructured":"[12] Liu, G., J. Zhai, and Y. Dai, \"Covert Channel Based on the Delta Modulation of IPID,\" 2010: China."},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/18.481773"},{"key":"ref11","article-title":"Keyboards and covert channels","volume-title":"Proceedings of the 15th conference on USENIX Security Symposium","author":"Shah","year":"2006","unstructured":"[15] Shah, G., A. Molina, and M. Blaze. \"Keyboards and covert channels,\" in Proceedings of the 15th conference on USENIX Security Symposium. 2006."},{"key":"ref12","doi-asserted-by":"crossref","first-page":"178","DOI":"10.1145\/1030083.1030108","article-title":"IP Covert Timing Channels: Design and Detection","volume-title":"Proceedings of the 11th ACM conference on Computer and communications security","author":"Cabuk","year":"2004","unstructured":"[17] Cabuk, S., C.E. Brodley, and C. Shields, \"IP Covert Timing Channels: Design and Detection,\" Proceedings of the 11th ACM conference on Computer and communications security, 2004: p. 178-187."},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/1315245.1315284"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2002.801405"},{"key":"ref15","first-page":"1","article-title":"Steganalysis of Network Packet Length Based Data Hiding","author":"Sur","year":"2012","unstructured":"[25] Arijit Sur, Anand S. Nair, Abhishek Kumar, \"Steganalysis of Network Packet Length Based Data Hiding,\" Circuits, Systems, and Signal Processing, 2012: p. 1-18.","journal-title":"Circuits Syst Signal Process","ISSN":"https:\/\/id.crossref.org\/issn\/0278-081X","issn-type":"print"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1016\/j.tourman.2010.03.015"},{"key":"ref17","volume-title":"Haining Wang Duminda Wijesekera Sushil Jajodia \"Model-based covert timing channels","author":"Gianvecchio","year":"2008","unstructured":"[28] Steven Gianvecchio, Haining Wang, Duminda Wijesekera, Sushil Jajodia. \"Model-based covert timing channels: Automated modeling and evasion,\" in Recent Advances in Intrusion Detection. 2008. Springer"}],"container-title":["Journal of Networks"],"original-title":[],"deposited":{"date-parts":[[2025,2,5]],"date-time":"2025-02-05T17:06:26Z","timestamp":1738775186000},"score":1,"resource":{"primary":{"URL":"https:\/\/dblp.org\/db\/journals\/jnw\/index.html"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,6,9]]},"references-count":17,"journal-issue":{"issue":"6","published-online":{"date-parts":[[2014,6,9]]}},"URL":"https:\/\/doi.org\/10.4304\/jnw.9.6.1440-1446","relation":{},"ISSN":["1796-2056"],"issn-type":[{"value":"1796-2056","type":"print"}],"subject":[],"published":{"date-parts":[[2014,6,9]]}}}