{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T18:42:56Z","timestamp":1729622576920,"version":"3.28.0"},"reference-count":14,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2008,12]]},"DOI":"10.1109\/pccc.2008.4745090","type":"proceedings-article","created":{"date-parts":[[2009,1,16]],"date-time":"2009-01-16T11:04:49Z","timestamp":1232103889000},"page":"439-444","source":"Crossref","is-referenced-by-count":2,"title":["Masquerading a Wired Covert Channel into a Wireless-like Channel"],"prefix":"10.1109","author":[{"given":"Mina","family":"Guirguis","sequence":"first","affiliation":[]},{"given":"Jason","family":"Valdez","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"year":"2003","author":"shon","journal-title":"Proceedings of IS CIS","article-title":"covert channel detection in the icmp payload using support vector machine","key":"13"},{"doi-asserted-by":"publisher","key":"14","DOI":"10.1109\/AMS.2007.80"},{"key":"11","doi-asserted-by":"crossref","DOI":"10.1007\/11558859_19","article-title":"embedding covert channels into tcp\/ip","author":"murdoch","year":"2005","journal-title":"Proceedings of the 7th International Workshop on Information Hiding"},{"year":"2005","author":"leboutillier","journal-title":"HTTunnel","key":"12"},{"key":"3","doi-asserted-by":"crossref","DOI":"10.1145\/1030083.1030108","article-title":"ip covert timing channels: design and detection","author":"cabuk","year":"2004","journal-title":"Proceedings of the 11th ACM conference on Computer and Communications Security (GGS'04)"},{"year":"2005","author":"berk","article-title":"detection of covert channel encoding in network packet delays","key":"2"},{"year":"2002","author":"ahsan","journal-title":"Workshop on Multimedia Security at ACM Multimedia","article-title":"practical data hiding in tcp\/ip","key":"1"},{"doi-asserted-by":"publisher","key":"10","DOI":"10.1109\/PCCC.2008.4745090"},{"year":"0","key":"7"},{"doi-asserted-by":"publisher","key":"6","DOI":"10.1109\/90.251892"},{"year":"0","key":"5"},{"doi-asserted-by":"publisher","key":"4","DOI":"10.1016\/0169-7552(89)90019-6"},{"key":"9","first-page":"2331","article-title":"exogenous-loss aware traffic management in overlay networks: toward global fairness","volume":"50","author":"guirguis","year":"2006","journal-title":"The Computer Networks Journal (GOMNET) The International Journal of Computer and Telecommunications Networking"},{"doi-asserted-by":"publisher","key":"8","DOI":"10.1109\/TDSC.2010.46"}],"event":{"name":"2008 IEEE International Performance Computing and Communications Conference (IPCCC)","start":{"date-parts":[[2008,12,7]]},"location":"Austin, TX, USA","end":{"date-parts":[[2008,12,9]]}},"container-title":["2008 IEEE International Performance, Computing and Communications Conference"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/4712735\/4745069\/04745090.pdf?arnumber=4745090","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,18]],"date-time":"2017-06-18T11:51:11Z","timestamp":1497786671000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/4745090\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008,12]]},"references-count":14,"URL":"https:\/\/doi.org\/10.1109\/pccc.2008.4745090","relation":{},"subject":[],"published":{"date-parts":[[2008,12]]}}}