WAND Network Research Group / Peer Reviewed Journal / Endace Limited / Simmons / John Wiley & Sons / /
Country
Australia / /
Currency
STD / / /
Event
Man-Made Disaster / /
Facility
Swinburne University of Technology Melbourne / /
IndustryTerm
large Internet site / speed network technologies / software framework / packet processing routines / intrusion detection systems / communications channels / host systems / normal user space applications / steganographic systems / extensible software framework / transport protocol / Internet Traffic / link layer protocols / tunnel network device / carrier traffic / higher-layer network protocols / intrusion detection software / covert communications / monolithic systems / inefficient systems / communication networks / input/output devices / /
NaturalFeature
Subliminal Channel / /
OperatingSystem
Linux / /
Organization
National Computer Security Center / US Department of Defense / Technical Report 080530A Swinburne University of Technology Melbourne / Department of Defense / Grenville Armitage Centre for Advanced Internet Architectures / /
Person
Bob Alice Bob Alice / Alice Alice Bob Bob / Alice Bob Alice Alice / Wendy Overt / Alice Bob Bob Figure / Also Alice / Alice / Alice Overt / Bob Alice Alice Bob / Bob Covert In Covert / Bob Covert / M. Van Horenbeeck / Alice Covert / /
Position
model for covert channel communication / communication model / forward / de-facto standard model for covert channel communication / warden / /
ProgrammingLanguage
php / /
PublishedMedium
IEEE Communications Magazine / /
TVStation
WAND / /
Technology
IPv6 / XML / Fast Ethernet / Linux / ATM / link layer protocols / operating system / html / UDP / TCP/IP Protocol / operating systems / IP protocol / pdf / XOR-based algorithm / encryption / higher-layer network protocols / flow control / high-speed network technologies / transport protocol / HTTP / IPv4 / simulation / Semantics-Preserving Application-Layer Protocol / network router / network protocols / /