Skip to Main Content Area
  • CPS-VO
    • Contact Support
  • Browse
    • Calendar
    • Announcements
    • Repositories
    • Groups
  • Search
    • Search for Content
    • Search for a Group
    • Search for People
    • Search for a Project
    • Tagcloud
      
 
Not a member?
Click here to register!
Forgot username or password?
 
Home
National Science Foundation

Cyber-Physical Systems Virtual Organization

Read-only archive of site from September 29, 2023.

CPS-VO

system security policies

biblio

Visible to the public Web Covert Timing Channels Detection Based on Entropy

Submitted by grigby1 on Thu, 09/05/2019 - 11:25am
  • Noise measurement
  • Web weaknesses
  • web vulnerabilities
  • Web covert timing channels detection
  • Web
  • victim
  • timing channel
  • telecommunication traffic
  • telecommunication channels
  • system security policies
  • security attacks
  • security
  • Scalability
  • resilience
  • Receivers
  • public access permission
  • channel entropy
  • modulation
  • memory storage
  • internet
  • information security
  • entropy-based detection method
  • entropy threshold
  • Entropy
  • disclosure information
  • delays
  • covert storage channels
  • covert channels
  • Convert Channel
  • computer network security
  • Compositionality
  • communication contrary
biblio

Visible to the public Packet Length Covert Channel: A Detection Scheme

Submitted by grigby1 on Thu, 09/05/2019 - 11:24am
  • Scalability
  • packet length covert channel
  • packet radio networks
  • packet size covert channel
  • Prevention
  • Protocols
  • Receivers
  • Reliability
  • resilience
  • normal terrific
  • security
  • security attack
  • system security policies
  • telecommunication channels
  • telecommunication security
  • telecommunication traffic
  • undetectable network covert channels
  • elimination
  • Communication channels
  • Compositionality
  • content development
  • content-based features
  • covert channel
  • covert channels
  • covert traffic
  • detection
  • communication channel
  • feature extraction
  • frequency-based features
  • illegal information flow
  • learning (artificial intelligence)
  • machine learning
  • machine learning based detection scheme
  • network protocols

Terms of Use  |  ©2023. CPS-VO