iBet uBet web content aggregator. Adding the entire web to your favor.
iBet uBet web content aggregator. Adding the entire web to your favor.



Link to original content: https://api.crossref.org/works/10.1109/WCINS.2010.5541837
{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T08:08:34Z","timestamp":1729670914018,"version":"3.28.0"},"reference-count":20,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010,6]]},"DOI":"10.1109\/wcins.2010.5541837","type":"proceedings-article","created":{"date-parts":[[2010,8,10]],"date-time":"2010-08-10T15:51:40Z","timestamp":1281455500000},"page":"538-543","source":"Crossref","is-referenced-by-count":2,"title":["Prime-based mimic functions for the implementation of covert channels"],"prefix":"10.1109","author":[{"given":"Wesley","family":"Connell","sequence":"first","affiliation":[]},{"given":"Dan","family":"Tamir","sequence":"additional","affiliation":[]},{"given":"Mina","family":"Guirguis","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/AMS.2007.80"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/1030083.1030108"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/MMIT.2008.29"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2002.808134"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1080\/0161-119291866883"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1080\/0161-119591883962"},{"journal-title":"Massachusetts Institute of Technology","article-title":"Foundations of Statistical Natural Language Processing","year":"1999","author":"manning","key":"ref16"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TASSP.1987.1165125"},{"key":"ref18","article-title":"Class-based N-gram Models of Natural Language","volume":"18","author":"brown","year":"1992","journal-title":"Computational Linguistics"},{"journal-title":"Oxford Clarendon Press","article-title":"An Introduction to the Theory of Numbers","year":"1960","author":"hardy","key":"ref19"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/PCCC.2008.4745090"},{"key":"ref3","doi-asserted-by":"crossref","DOI":"10.1007\/11558859_19","article-title":"Embedding Covert Channels into TCP\/IP","author":"murdoch","year":"2005","journal-title":"Proceedings of the 7th International Workshop on Information Hiding"},{"journal-title":"Proc ISCIS","article-title":"Covert Channel Detection in the ICMP Payload Using Support Vector Machine","year":"2003","author":"shon","key":"ref6"},{"journal-title":"The University of Wisconsin - Milwaukee Thesis","article-title":"Hiding the Hidden: A Software System for Concealing Ciphertext as Innocuous Text","year":"1997","author":"chapman","key":"ref5"},{"journal-title":"Proc of the International Workshop on Information Hiding","article-title":"Eliminating Steganography in Internet Traffic with Active Wardens","year":"2002","author":"fisk","key":"ref8"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1117\/12.649551"},{"journal-title":"Introduction to Automata Theory Languages and Computation","year":"2006","author":"hopcroft","key":"ref2"},{"journal-title":"Information Hiding Techniques for Steganography and Digital Watermarking","year":"2000","author":"katzenbeisser","key":"ref1"},{"key":"ref9","doi-asserted-by":"crossref","DOI":"10.1145\/1315245.1315284","article-title":"Detecting Covert Timing Channels: An Entropy-based Approach","author":"gianvecchio","year":"2007","journal-title":"Proceedings of the 14th ACM Conference on Computer and Communications Security (CCS'07)"},{"article-title":"Prime Based Mimic Functions","year":"2009","author":"connell","key":"ref20"}],"event":{"name":"2010 IEEE International Conference on Wireless Communications, Networking and Information Security (WCNIS)","start":{"date-parts":[[2010,6,25]]},"location":"Beijing, China","end":{"date-parts":[[2010,6,27]]}},"container-title":["2010 IEEE International Conference on Wireless Communications, Networking and Information Security"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5524730\/5541718\/05541837.pdf?arnumber=5541837","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,19]],"date-time":"2017-06-19T12:22:39Z","timestamp":1497874959000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5541837\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,6]]},"references-count":20,"URL":"http:\/\/dx.doi.org\/10.1109\/wcins.2010.5541837","relation":{},"subject":[],"published":{"date-parts":[[2010,6]]}}}