A survey of timing channels and countermeasures
A timing channel is a communication channel that can transfer information to a
receiver/decoder by modulating the timing behavior of an entity. Examples of this entity …
receiver/decoder by modulating the timing behavior of an entity. Examples of this entity …
Issues, challenges, and research opportunities in intelligent transport system for security and privacy
Intelligent transport system (ITS), owing to their potential to enhance road safety and
improve traffic management, have attracted attention from automotive industries and …
improve traffic management, have attracted attention from automotive industries and …
Survey on network flow watermarking: model, interferences, applications, technologies and security
L Zhang, Y Kong, Y Guo, J Yan, Z Wang - IET Communications, 2018 - Wiley Online Library
Compared with passive flow correlation technologies based on flow characteristics, network
flow watermarking, a kind of active flow correlation technology, is characterised by high …
flow watermarking, a kind of active flow correlation technology, is characterised by high …
Flow watermarking for antinoise and multistream tracing in anonymous networks
R Wang, G Xu, B Liu, Y Cao, X Li - IEEE MultiMedia, 2017 - ieeexplore.ieee.org
To solve the problems of noise interference and multistream tracing in anonymous network
tracing, this article proposes an interval packet-size-based spread spectrum (IPS3) network …
tracing, this article proposes an interval packet-size-based spread spectrum (IPS3) network …
An interval centroid based spread spectrum watermark for tracing multiple network flows
X Wang, J Luo, M Yang - 2009 IEEE International Conference …, 2009 - ieeexplore.ieee.org
Network flow watermarking schemes have been proposed to trace attackers in the presence
of step** stones or anonymized channels. Most existing interval-based watermarking …
of step** stones or anonymized channels. Most existing interval-based watermarking …
MSAC and multi-flow attacks resistant spread spectrum watermarks for network flows
L Zhang, Z Wang, Q Wang… - 2010 2nd IEEE …, 2010 - ieeexplore.ieee.org
To address the problems of anonymous abuse, a new class of flow watermarking technique
for invisible traceback based on Direct Sequence Spread Spectrum (DSSS) was developed …
for invisible traceback based on Direct Sequence Spread Spectrum (DSSS) was developed …
Multiple redundant flow fingerprint model based on time slots.
LIU Kexian, G Jianfeng, Z Wancheng… - Chinese Journal of …, 2023 - search.ebscohost.com
With the increasingly widespread use of the Internet, various network security problems are
frequently exposed, while the" patching" style security enhancement mechanisms cannot …
frequently exposed, while the" patching" style security enhancement mechanisms cannot …
[PDF][PDF] An entropy and hash based double redundancy watermark model for multi-flow tracing
XY Hou, YH Chen, H Tian, T Wang, YQ Cai - J. Comput, 2017 - csroc.org.tw
Digital watermarking is a new method for network traffic tracing. Existing watermarking
schemes have an obvious phenomenon that embedded watermarks have nothing to do with …
schemes have an obvious phenomenon that embedded watermarks have nothing to do with …
Long PN code based traceback in wireless networks
Cyber criminals may abuse open wireless networks or those with weak encryption for cyber
crimes. To locate such criminals, law enforcement has to first identify which mobile (MAC) is …
crimes. To locate such criminals, law enforcement has to first identify which mobile (MAC) is …
基于时隙的多重冗余流指纹模型
刘科显, 关建峰, 张婉澂, 何志凯… - 网络与信息安全 …, 2023 - infocomm-journal.com
随着互联网的日益广泛应用, 各种网络安全问题频频暴露, 以“打补丁” 形式为主的安全增**模式
难以有效防范日益增长的安全风险, 网络安全领域研究者认为未来互联网体系架构应当将安全 …
难以有效防范日益增长的安全风险, 网络安全领域研究者认为未来互联网体系架构应当将安全 …