[1] Lampson BW.:A note on the confinement problem.Commun.of the ACM,1973,16(10):613-615.
[2] 张然,尹毅峰,黄新彭等.网络隐蔽通道的研究与实现[J].电脑知识与技术,2014(22):5198-5200,5203.
[3] 贾丛飞.网络隐蔽通道检测技术研究[J]. 电脑知识与技术, 2018.14(32): 35-37.
[4]董丽鹏,等.网络隐蔽信道实现机制及检测技术研究[J].计算机科学,2015,(7):216-221
[5] Johnson Daryl, Lutz Peter, Yuan Bo, Stokes Kristian: ICMP Covert Channel Resiliency [EB/OL].2009.http://scholarwork.rit.edu/other/768
[6] 王永吉,吴敬征.隐蔽信道研究[J].软件学报,2010.21(9):2262-2288.
[7] 王钊.网络数据通信中的隐蔽通道技术[J].信息通信,2016(08):228-229.
[8] Gianvecchio S , Wang H :An Entropy-Based Approach to Detecting Covert Timing Channels[C]// Proc of the 2007 ACM Conference on Computer and Communications Security, Alexandria, Virginia, USA:ACM, 2007.
[9] 吴传伟,孙瑞,罗敏等.基于SVM的Telnet隐蔽信道检测[J].信息安全与通信保密,2012(9):97-101.
[10] 姬国珍,谭全福.基于数据包时间间隔的隐蔽通道实现及检测方法研究[J]. 通信技术, 2018. 51(01): 189-194.
[11] 袁健,王涛.基于聚类分析的网络存储隐蔽信道检测算法[J].计算机工程,2015.41(9):168-173.
[12] Song H , Li X: Collaborative detection of Covert Storage Channels[J]. IEEE Military Communications Conference,2016:515-520.
[13] Yuwen Q,Huaju S,Chao S,et al.Network covert channel detection with cluster based on hierarchy and density[J].Procedia Engineering,2012,29:4175-4180.
[14] 唐彰国,李焕洲,钟明全,等.基于量子神经网络的启发式网络隐蔽信道加测模型[J].计算机应用研究,2012,29(8):3033-3035,3038.
[15] 陈翔,唐俊勇. 基于贝叶斯与因果岭回归的物联网流量预测模型 [J].四川大学学报:自然科学版,2018,55: 965~970.
[16] Postel J:Internet control message protocol. [EB/OL]. darpa internet program protocol specification.RFC 792, 1981. http://www.faqs.org/rfcs/rfc792.html
|