[1] |
DAKHANE D M , DESHMUKH P R . Active warden for TCP sequence number base covert channel[C]// International Conference on Pervasive Computing,Jan 8-10,2015,Pune,India. Piscataway:IEEE Press, 2015: 1-5.
|
[2] |
ZANDER S , ARMITAGE G , BRANCH P . Covert channels and countermeasures in computer network protocols[J]. IEEE Communications Surveys & Tutorials, 2007,9(3): 44-57.
|
[3] |
王娟, 郭永冲, 王强 ,等. 基于BHO的网络隐蔽通道研究[J]. 计算机工程, 2009,35(5): 159-161,164.
|
|
WANG J , GUO · C , WANG Q ,et al. Research of network covert channel based on BHO[J]. Computer Engineering, 2009,35(5): 159-161,164.
|
[4] |
AHMADZADEH S A , AGNEW G . Turbo covert channel:an iterative framework for covert communication over data networks[C]// IEEE INFOCOM,April 14-19,2013,Turin,Italy. Piscataway:IEEE Press, 2013: 2031-2039.
|
[5] |
姬国珍, 谭全福 . 基于数据包时间间隔的隐蔽通道实现及检测方法研究[J]. 通信技术, 2018,51(1): 189-194.
|
|
JI G Z , TAN Q F . Covert channel implementation based on between-packet time intervals and detection method[J]. Communications Technology, 2018,51(1): 189-194.
|
[6] |
李卫, 嵩天 . 适用于NAT环境的隐蔽通道构建方法[J]. 计算机工程与应用, 2018,54(17): 103-109.
|
|
LI W , SONG T . Covert channel applying to NAT environment[J]. Computer Engineering and Applications, 2018,54(17): 103-109.
|
[7] |
朱越凡, 马迪, 王伟 ,等. 一种 NTP 协议隐蔽通道[J]. 计算机系统应用, 2017,26(5): 119-125.
|
|
ZHU · F , MA D , WANG W ,et al. Covert channel based on NTP protocol[J]. Computer Systems & Applications, 2017,26(5): 119-125.
|
[8] |
TAN · A , XU X , LIANG C ,et al. An end-to-end covert channel via packet dropout for mobile networks[J]. International Journal of Distributed Sensor Networks, 2018,14(5).
|
[9] |
·ANG Z , HUANG Q , ZHANG Q ,et al. NICScatter:backscatter as a covert channel in mobile devices[Z]. 2017.
|
[10] |
SCHULZ M , LINK J . Shadow Wi-Fi:teaching smartphones to transmit raw signals and to extract channel state information to implement practical covert channels over Wi-Fi[C]// The 16th Annual International Conference on Mobile Systems,Applications,and Services Table of Contents,June 10-15,2018,San Francisco,California,USA.[S.l.:s.n]. 2018: 256-268.
|
[11] |
WU K , WEI Z S , TEACHER W Z . A study on the application of intrusion detection technology to WLAN[C]// IEEE International Conference on Communication Software and Networks,May 27-29,2011,Xi’an,China. Piscataway:IEEE Press, 2011: 344-346.
|
[12] |
谭彦, 厉萍, 卢洪涛 ,等. Wi-Fi 无线钓鱼攻击分析及应对技术研究[J]. 电信科学, 2013,29(Z2): 143-146,151.
|
|
TAN · , LI P , LU H T ,et al. Wi-Fi wireless phishing attack analysis and coping technology research[J]. Telecommunications Science, 2013,29(Z2): 143-146,151.
|
[13] |
高波, 潘毅明, 黄国瑾 . 基于城域组网的运营级WLAN组网技术[J]. 电信科学, 2015,31(10): 199-203.
|
|
GAO B , PAN · M , HUANG G J . Technology of WLAN in operation level based on metropolitan area network[J]. Telecommunications Science, 2015,31(10): 199-203.
|