Covert

Results: 573



#Item
61Domain name system / Internet / Computing / Network architecture / DNS hijacking / Extension mechanisms for DNS / Covert channel / CNAME record / Name server

On Robust Covert Channels Inside DNS Lucas Nussbaum, Pierre Neyron and Olivier Richard Laboratoire d’Informatique de Grenoble / INRIA Lucas Nussbaum, Pierre Neyron and Olivier Richard On Robust Covert Channels Inside D

Add to Reading List

Source URL: www.loria.fr

Language: English - Date: 2011-10-12 09:35:39
62

Addressing Covert Termination and Timing Channels in Concurrent Information Flow Systems Deian Stefan1 Alejandro Russo2

Add to Reading List

Source URL: cseweb.ucsd.edu

Language: English - Date: 2015-11-05 00:11:09
    63

    The Grim RIPA Cataloguing the ways in which local authorities have abused their covert surveillance powers 1 Key findings 

    Add to Reading List

    Source URL: www.bigbrotherwatch.org.uk

    Language: English - Date: 2015-10-16 11:10:38
      64

      Addressing Covert Termination and Timing Channels in Concurrent Information Flow Systems Deian Stefan, Alejandro Russo, Pablo Buiras, Amit Levy, John Mitchell, and David Mazières

      Add to Reading List

      Source URL: cseweb.ucsd.edu

      Language: English - Date: 2015-11-05 00:11:09
        65Computing / Domain name system / Internet / Network architecture / Internet privacy / Computer network security / DNS hijacking / Hacking / Transmission Control Protocol / Proxy server / CNAME record / Captive portal

        On Robust Covert Channels Inside DNS Lucas Nussbaum, Pierre Neyron and Olivier Richard Abstract Covert channels inside DNS allow evasion of networks which only provide a restricted access to the Internet. By encapsulatin

        Add to Reading List

        Source URL: www.loria.fr

        Language: English - Date: 2011-10-12 09:35:39
        66

        Data Exfiltration and Covert Channels ∗ Annarita Giani and Vincent H. Berk and George V. Cybenko Thayer School of Engineering, Dartmouth College, Hanover, NHUSA ABSTRACT Within a

        Add to Reading List

        Source URL: www.ists.dartmouth.edu

        Language: English - Date: 2008-09-11 13:39:47
          67Bioinformatics / Data / Information / Statistics / Least squares / Systems biology / Support vector machine / Parameter / Prediction

          Summary of the DREAM8 Parameter Estimation Challenge: Toward Parameter Identification for Whole-Cell Models

          Add to Reading List

          Source URL: covert.stanford.edu

          Language: English - Date: 2015-10-29 14:40:47
          68

          Thesis for the Degree of Doctor of Philosophy Language Support for Controlling Timing-Based Covert Channels Alejandro Russo

          Add to Reading List

          Source URL: www.cse.chalmers.se

          Language: English - Date: 2015-08-02 17:44:39
            69

            Addressing Covert Termination and Timing Channels in Concurrent Information Flow Systems Deian Stefan1 Alejandro Russo2

            Add to Reading List

            Source URL: www.cse.chalmers.se

            Language: English - Date: 2012-07-01 21:57:45
              70

              Detection of Covert Channel Encoding in Network Packet Delays Department of Computer Science - Dartmouth College Technical Report TR536, Revision 1 August 2005, revised November 2005 Vincent Berk, Annarita Giani, George

              Add to Reading List

              Source URL: www.ists.dartmouth.edu

              Language: English - Date: 2008-09-11 13:38:43
                UPDATE