{"id":"https://openalex.org/W1515726562","doi":"https://doi.org/10.1002/sec.1013","title":"A novel automated framework for modeling and evaluating covert channel algorithms","display_name":"A novel automated framework for modeling and evaluating covert channel algorithms","publication_year":2014,"publication_date":"2014-05-29","ids":{"openalex":"https://openalex.org/W1515726562","doi":"https://doi.org/10.1002/sec.1013","mag":"1515726562"},"language":"en","primary_location":{"is_oa":true,"landing_page_url":"https://doi.org/10.1002/sec.1013","pdf_url":null,"source":{"id":"https://openalex.org/S120683614","display_name":"Security and Communication Networks","issn_l":"1939-0122","issn":["1939-0122","1939-0114"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319869","host_organization_name":"Hindawi Publishing Corporation","host_organization_lineage":["https://openalex.org/P4310319869"],"host_organization_lineage_names":["Hindawi Publishing Corporation"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true},"type":"article","type_crossref":"journal-article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":"https://doi.org/10.1002/sec.1013","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5103569147","display_name":"Fahimeh Rezaei","orcid":"https://orcid.org/0000-0003-2461-3517"},"institutions":[{"id":"https://openalex.org/I114395901","display_name":"University of Nebraska\u2013Lincoln","ror":"https://ror.org/043mer456","country_code":"US","type":"education","lineage":["https://openalex.org/I114395901"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Fahimeh Rezaei","raw_affiliation_strings":["Computer and Electronics Engineering Department, University of Nebraska-Lincoln, Omaha, NE, U.S.A.#TAB#"],"affiliations":[{"raw_affiliation_string":"Computer and Electronics Engineering Department, University of Nebraska-Lincoln, Omaha, NE, U.S.A.#TAB#","institution_ids":["https://openalex.org/I114395901"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5041294451","display_name":"Michael Hempel","orcid":"https://orcid.org/0000-0002-7091-8349"},"institutions":[{"id":"https://openalex.org/I114395901","display_name":"University of Nebraska\u2013Lincoln","ror":"https://ror.org/043mer456","country_code":"US","type":"education","lineage":["https://openalex.org/I114395901"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Michael Hempel","raw_affiliation_strings":["Computer and Electronics Engineering Department, University of Nebraska-Lincoln, Omaha, NE, U.S.A.#TAB#"],"affiliations":[{"raw_affiliation_string":"Computer and Electronics Engineering Department, University of Nebraska-Lincoln, Omaha, NE, U.S.A.#TAB#","institution_ids":["https://openalex.org/I114395901"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5032208035","display_name":"Hamid Sharif","orcid":"https://orcid.org/0000-0001-6229-2043"},"institutions":[{"id":"https://openalex.org/I114395901","display_name":"University of Nebraska\u2013Lincoln","ror":"https://ror.org/043mer456","country_code":"US","type":"education","lineage":["https://openalex.org/I114395901"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Hamid Sharif","raw_affiliation_strings":["Computer and Electronics Engineering Department, University of Nebraska-Lincoln, Omaha, NE, U.S.A.#TAB#"],"affiliations":[{"raw_affiliation_string":"Computer and Electronics Engineering Department, University of Nebraska-Lincoln, Omaha, NE, U.S.A.#TAB#","institution_ids":["https://openalex.org/I114395901"]}]}],"institution_assertions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":{"value":2100,"currency":"USD","value_usd":2100,"provenance":"doaj"},"apc_paid":null,"fwci":2.643,"has_fulltext":true,"fulltext_origin":"ngrams","cited_by_count":12,"citation_normalized_percentile":{"value":0.880546,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":87,"max":88},"biblio":{"volume":"8","issue":"4","first_page":"649","last_page":"660"},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9979,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9937,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/covert-channel","display_name":"Covert channel","score":0.44975322},{"id":"https://openalex.org/keywords/covert","display_name":"Covert","score":0.42803353}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.91540587},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.5562856},{"id":"https://openalex.org/C127162648","wikidata":"https://www.wikidata.org/wiki/Q16858953","display_name":"Channel (broadcasting)","level":2,"score":0.4745596},{"id":"https://openalex.org/C29024540","wikidata":"https://www.wikidata.org/wiki/Q1476964","display_name":"Covert channel","level":5,"score":0.44975322},{"id":"https://openalex.org/C2779338814","wikidata":"https://www.wikidata.org/wiki/Q5179285","display_name":"Covert","level":2,"score":0.42803353},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.38608217},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.20593798},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.06421915},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.0},{"id":"https://openalex.org/C103377522","wikidata":"https://www.wikidata.org/wiki/Q3493999","display_name":"Security information and event management","level":4,"score":0.0},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C184842701","wikidata":"https://www.wikidata.org/wiki/Q370563","display_name":"Cloud computing security","level":3,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"is_oa":true,"landing_page_url":"https://doi.org/10.1002/sec.1013","pdf_url":null,"source":{"id":"https://openalex.org/S120683614","display_name":"Security and Communication Networks","issn_l":"1939-0122","issn":["1939-0122","1939-0114"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319869","host_organization_name":"Hindawi Publishing Corporation","host_organization_lineage":["https://openalex.org/P4310319869"],"host_organization_lineage_names":["Hindawi Publishing Corporation"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true}],"best_oa_location":{"is_oa":true,"landing_page_url":"https://doi.org/10.1002/sec.1013","pdf_url":null,"source":{"id":"https://openalex.org/S120683614","display_name":"Security and Communication Networks","issn_l":"1939-0122","issn":["1939-0122","1939-0114"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319869","host_organization_name":"Hindawi Publishing Corporation","host_organization_lineage":["https://openalex.org/P4310319869"],"host_organization_lineage_names":["Hindawi Publishing Corporation"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true},"sustainable_development_goals":[],"grants":[],"datasets":[],"versions":[],"referenced_works_count":29,"referenced_works":["https://openalex.org/W1495134838","https://openalex.org/W1514785041","https://openalex.org/W1839529939","https://openalex.org/W2001758150","https://openalex.org/W2002986532","https://openalex.org/W2005490844","https://openalex.org/W2030637766","https://openalex.org/W2054223115","https://openalex.org/W2068925185","https://openalex.org/W2087619997","https://openalex.org/W2101115142","https://openalex.org/W2101634187","https://openalex.org/W2120467192","https://openalex.org/W2127264212","https://openalex.org/W2127544167","https://openalex.org/W2127991134","https://openalex.org/W2132177566","https://openalex.org/W2150092124","https://openalex.org/W2151185692","https://openalex.org/W2155935285","https://openalex.org/W2157428729","https://openalex.org/W2157970202","https://openalex.org/W2158671594","https://openalex.org/W2165810661","https://openalex.org/W2170219762","https://openalex.org/W2546483130","https://openalex.org/W25952552","https://openalex.org/W3105204169","https://openalex.org/W9827866"],"related_works":["https://openalex.org/W4386075149","https://openalex.org/W4319780484","https://openalex.org/W4239080508","https://openalex.org/W4224042389","https://openalex.org/W2409612194","https://openalex.org/W2326198059","https://openalex.org/W20460883","https://openalex.org/W174282171","https://openalex.org/W1587013156","https://openalex.org/W1568579691"],"abstract_inverted_index":{"In":[0,76],"this":[1],"paper,":[2],"we":[3,87],"introduce":[4],"an":[5],"automated":[6],"framework":[7,113],"that":[8,36,94,102],"can":[9,22,37],"model":[10],"covert":[11,33,48,56,91,108],"communication":[12,34,109,120],"algorithms.":[13],"Our":[14],"proposed":[15,84],"framework,":[16,86],"Automated":[17],"Covert":[18],"Channel":[19],"Modeling":[20],"ACCM,":[21],"provide":[23],"a":[24],"reliable":[25],"and":[26,45,63,67,121],"valid":[27],"implementation":[28],"method":[29],"for":[30],"fully":[31],"functional":[32],"techniques":[35],"be":[38],"used":[39],"to":[40,59,73,78],"study":[41],"various":[42],"concepts,":[43],"characteristics":[44,104],"features":[46,54],"of":[47,55,69,82,118],"communication.":[49],"ACCM":[50,85,112],"exploits":[51],"the":[52,70,80,103,111,115,122],"shared":[53],"channel":[57,92],"algorithms":[58,93],"define":[60],"common":[61,71],"blocks":[62,72],"automatically":[64],"converts":[65],"tasks":[66],"events":[68],"executable":[74],"codes.":[75],"order":[77],"verify":[79],"accuracy":[81],"our":[83],"implement":[88],"two":[89],"different":[90],"are":[95],"referenced":[96],"repeatedly":[97],"in":[98],"literature.":[99],"We":[100],"demonstrate":[101],"obtained":[105],"from":[106],"implementing":[107],"using":[110],"match":[114],"theoretical":[116],"concepts":[117],"network":[119],"expected":[123],"results.":[124],"Copyright":[125],"\u00a9":[126],"2014":[127],"John":[128],"Wiley":[129],"&":[130],"Sons,":[131],"Ltd.":[132]},"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W1515726562","counts_by_year":[{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":1},{"year":2020,"cited_by_count":2},{"year":2017,"cited_by_count":2},{"year":2016,"cited_by_count":2},{"year":2015,"cited_by_count":2},{"year":2014,"cited_by_count":2}],"updated_date":"2024-12-09T04:41:48.126464","created_date":"2016-06-24"}