Covert channel

Results: 66



#Item
51Journal of Communications Vol. 8, No. 11, November[removed]On Covert Acoustical Mesh Networks in Air Michael Hanspach and Michael Goetz Fraunhofer FKIE, Wachtberg, Germany Email: {michael.hanspach, michael.goetz}@fkie.frau

Journal of Communications Vol. 8, No. 11, November[removed]On Covert Acoustical Mesh Networks in Air Michael Hanspach and Michael Goetz Fraunhofer FKIE, Wachtberg, Germany Email: {michael.hanspach, michael.goetz}@fkie.frau

Add to Reading List

Source URL: www.jocm.us

Language: English - Date: 2013-11-24 21:38:03
52FOUNDATIONS FOR THE HARMONIZATION OF  INFORMATION TECHNOLOGY SECURITY STANDARDS Item:

FOUNDATIONS FOR THE HARMONIZATION OF INFORMATION TECHNOLOGY SECURITY STANDARDS Item:

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2013-03-11 15:45:42
53On Covert Acoustical Mesh Networks in Air Michael Hanspach and Michael Goetz arXiv:1406.1213v1 [cs.CR] 4 Jun[removed]Fraunhofer FKIE, Wachtberg, Germany

On Covert Acoustical Mesh Networks in Air Michael Hanspach and Michael Goetz arXiv:1406.1213v1 [cs.CR] 4 Jun[removed]Fraunhofer FKIE, Wachtberg, Germany

Add to Reading List

Source URL: cryptome.org

Language: English - Date: 2014-06-06 08:01:41
541  Embedding Covert Channels into TCP/IP

1 Embedding Covert Channels into TCP/IP

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2005-07-29 14:41:40
55A SECURPI’Y POLICY AND FORMAL TOP LEVEL SPEC~CATiON FOR A MULTI-LEVEL SECURE LOCAL AREA NETWOIW (Extended Abstract)

A SECURPI’Y POLICY AND FORMAL TOP LEVEL SPEC~CATiON FOR A MULTI-LEVEL SECURE LOCAL AREA NETWOIW (Extended Abstract)

Add to Reading List

Source URL: www.cs.washington.edu

Language: English - Date: 2007-04-07 00:44:02
56RC24154 (W0701-086) January 18, 2007 Computer Science

RC24154 (W0701-086) January 18, 2007 Computer Science

Add to Reading List

Source URL: nsrc.cse.psu.edu

Language: English - Date: 2013-08-20 15:06:04
57WLAN Steganography: A First Practical Review Christian Krätzer

WLAN Steganography: A First Practical Review Christian Krätzer

Add to Reading List

Source URL: wwwiti.cs.uni-magdeburg.de

Language: English - Date: 2006-11-09 03:18:13
58Secure Hypervisors Sebastian Vogl Fakult¨

Secure Hypervisors Sebastian Vogl Fakult¨

Add to Reading List

Source URL: www.sec.in.tum.de

Language: English - Date: 2009-10-05 06:46:18
59Journal of Information Assurance and Security[removed]  Steganographic Routing in

Journal of Information Assurance and Security[removed] Steganographic Routing in

Add to Reading List

Source URL: ksz.tele.pw.edu.pl

Language: English - Date: 2008-04-15 17:14:10
60Steganography of VoIP Streams Wojciech Mazurczyk and Krzysztof Szczypiorski Warsaw University of Technology,

Steganography of VoIP Streams Wojciech Mazurczyk and Krzysztof Szczypiorski Warsaw University of Technology,

Add to Reading List

Source URL: home.elka.pw.edu.pl

Language: English - Date: 2008-09-13 06:19:46