1![Detection of Covert Channel Encoding in Network Packet Delays Department of Computer Science - Dartmouth College Technical Report TR536, Revision 1 August 2005, revised November 2005 Vincent Berk, Annarita Giani, George Detection of Covert Channel Encoding in Network Packet Delays Department of Computer Science - Dartmouth College Technical Report TR536, Revision 1 August 2005, revised November 2005 Vincent Berk, Annarita Giani, George](https://www.pdfsearch.io/img/ad82dca1825e246d0fe43a7cecea7353.jpg) | Add to Reading ListSource URL: gray-world.netLanguage: English - Date: 2010-06-12 03:14:41
|
---|
2![20 Years of Covert Channel Modeling and Analysis Jonathan Millen SRI International Computer Science Laboratory Menlo Park, CA 94025 20 Years of Covert Channel Modeling and Analysis Jonathan Millen SRI International Computer Science Laboratory Menlo Park, CA 94025](https://www.pdfsearch.io/img/71a344699c194b61e794ae029cc4a6f4.jpg) | Add to Reading ListSource URL: jonmillen.comLanguage: English - Date: 2017-01-20 09:51:59
|
---|
3![How to cook a covert channel Techniques Simon Castro and Gray World Team Difficulty How to cook a covert channel Techniques Simon Castro and Gray World Team Difficulty](https://www.pdfsearch.io/img/7b765752e3710c92dce97d6d72922558.jpg) | Add to Reading ListSource URL: gray-world.netLanguage: English - Date: 2010-06-12 03:14:41
|
---|
4![Sixth Annual Conference on Privacy, Security and Trust A Protocol for Building Secure and Reliable Covert Channel Baishakhi Ray University Of Colorado, Boulder Department Of Computer Science Sixth Annual Conference on Privacy, Security and Trust A Protocol for Building Secure and Reliable Covert Channel Baishakhi Ray University Of Colorado, Boulder Department Of Computer Science](https://www.pdfsearch.io/img/f25953ce3376a6f30f6790ddefd6a2eb.jpg) | Add to Reading ListSource URL: rayb.info- Date: 2016-08-19 22:20:15
|
---|
5![Tapping the full potential of DRAM-based covert channels Advisor(s): Peter Pessl Institute for Applied Information Processing and Communications (IAIK) Graz University of Technology, Austria Tapping the full potential of DRAM-based covert channels Advisor(s): Peter Pessl Institute for Applied Information Processing and Communications (IAIK) Graz University of Technology, Austria](https://www.pdfsearch.io/img/68df280071929427ac11292991179b0c.jpg) | Add to Reading ListSource URL: www.iaik.tugraz.atLanguage: English - Date: 2015-11-30 11:00:03
|
---|
6![ICS 355: Introduction Dusko Pavlovic Covert Security and Trust I: ICS 355: Introduction Dusko Pavlovic Covert Security and Trust I:](https://www.pdfsearch.io/img/c9179e222e6c42ad7d0626016d105a02.jpg) | Add to Reading ListSource URL: www.asecolab.orgLanguage: English - Date: 2014-12-01 15:45:46
|
---|
7![On the Capacity of Thermal Covert Channels in Multicores Davide B. Bartolini Philipp Miedl Lothar Thiele On the Capacity of Thermal Covert Channels in Multicores Davide B. Bartolini Philipp Miedl Lothar Thiele](https://www.pdfsearch.io/img/2334f86722d8fea9b81c2aaba9e5945c.jpg) | Add to Reading ListSource URL: www.tik.ee.ethz.chLanguage: English - Date: 2016-04-15 07:21:50
|
---|
8![IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 8, NO. 3, MARCHA Timing Channel Spyware for the CSMA/CA Protocol IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 8, NO. 3, MARCHA Timing Channel Spyware for the CSMA/CA Protocol](https://www.pdfsearch.io/img/5bd69c5662ddccb6d902d514265fa0f5.jpg) | Add to Reading ListSource URL: coleman.ucsd.eduLanguage: English |
---|
9![64 IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 7, NO. 1, FEBRUARY 2012 Characterizing the Efficacy of the NRL Network Pump in Mitigating Covert Timing Channels 64 IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 7, NO. 1, FEBRUARY 2012 Characterizing the Efficacy of the NRL Network Pump in Mitigating Covert Timing Channels](https://www.pdfsearch.io/img/5174d72645783abe8642c2835b67ca04.jpg) | Add to Reading ListSource URL: coleman.ucsd.eduLanguage: English |
---|
10![Covert Channels in Multiple Access Protocols Seyed Ali Ahmadzadeh Gordon B. Agnew University of Waterloo, Canada Covert Channels in Multiple Access Protocols Seyed Ali Ahmadzadeh Gordon B. Agnew University of Waterloo, Canada](https://www.pdfsearch.io/img/f9c1c4979052e82745c0fd408fb4edc9.jpg) | Add to Reading ListSource URL: conferences.sigcomm.orgLanguage: English - Date: 2011-08-01 22:51:56
|
---|