A survey of timing channels and countermeasures

AK Biswas, D Ghosal, S Nagaraja - ACM Computing Surveys (CSUR), 2017 - dl.acm.org
A timing channel is a communication channel that can transfer information to a
receiver/decoder by modulating the timing behavior of an entity. Examples of this entity …

Issues, challenges, and research opportunities in intelligent transport system for security and privacy

QE Ali, N Ahmad, AH Malik, G Ali, WU Rehman - Applied Sciences, 2018 - mdpi.com
Intelligent transport system (ITS), owing to their potential to enhance road safety and
improve traffic management, have attracted attention from automotive industries and …

Survey on network flow watermarking: model, interferences, applications, technologies and security

L Zhang, Y Kong, Y Guo, J Yan, Z Wang - IET Communications, 2018 - Wiley Online Library
Compared with passive flow correlation technologies based on flow characteristics, network
flow watermarking, a kind of active flow correlation technology, is characterised by high …

Flow watermarking for antinoise and multistream tracing in anonymous networks

R Wang, G Xu, B Liu, Y Cao, X Li - IEEE MultiMedia, 2017 - ieeexplore.ieee.org
To solve the problems of noise interference and multistream tracing in anonymous network
tracing, this article proposes an interval packet-size-based spread spectrum (IPS3) network …

An interval centroid based spread spectrum watermark for tracing multiple network flows

X Wang, J Luo, M Yang - 2009 IEEE International Conference …, 2009 - ieeexplore.ieee.org
Network flow watermarking schemes have been proposed to trace attackers in the presence
of step** stones or anonymized channels. Most existing interval-based watermarking …

MSAC and multi-flow attacks resistant spread spectrum watermarks for network flows

L Zhang, Z Wang, Q Wang… - 2010 2nd IEEE …, 2010 - ieeexplore.ieee.org
To address the problems of anonymous abuse, a new class of flow watermarking technique
for invisible traceback based on Direct Sequence Spread Spectrum (DSSS) was developed …

Multiple redundant flow fingerprint model based on time slots.

LIU Kexian, G Jianfeng, Z Wancheng… - Chinese Journal of …, 2023 - search.ebscohost.com
With the increasingly widespread use of the Internet, various network security problems are
frequently exposed, while the" patching" style security enhancement mechanisms cannot …

[PDF][PDF] An entropy and hash based double redundancy watermark model for multi-flow tracing

XY Hou, YH Chen, H Tian, T Wang, YQ Cai - J. Comput, 2017 - csroc.org.tw
Digital watermarking is a new method for network traffic tracing. Existing watermarking
schemes have an obvious phenomenon that embedded watermarks have nothing to do with …

Long PN code based traceback in wireless networks

X Pan, J Huang, Z Ling, B Lu, X Fu - International Journal of …, 2012 - ijpe-online.com
Cyber criminals may abuse open wireless networks or those with weak encryption for cyber
crimes. To locate such criminals, law enforcement has to first identify which mobile (MAC) is …

基于时隙的多重冗余流指纹模型

刘科显, 关建峰, 张婉澂, 何志凯… - 网络与信息安全 …, 2023 - infocomm-journal.com
随着互联网的日益广泛应用, 各种网络安全问题频频暴露, 以“打补丁” 形式为主的安全增**模式
难以有效防范日益增长的安全风险, 网络安全领域研究者认为未来互联网体系架构应当将安全 …