A comparative analysis of detection metrics for covert timing channels (English)
- New search for: Archibald, Rennie
- New search for: Ghosal, Dipak
- New search for: Archibald, Rennie
- New search for: Ghosal, Dipak
In:
Computers & Security
;
45
;
284-292
;
2014
-
ISSN:
- Article (Journal) / Print
-
Title:A comparative analysis of detection metrics for covert timing channels
-
Contributors:Archibald, Rennie ( author ) / Ghosal, Dipak ( author )
-
Published in:Computers & Security ; 45 ; 284-292
-
Publisher:
-
Publication date:2014
-
Size:9 Seiten, 21 Quellen
-
ISSN:
-
Coden:
-
DOI:
-
Type of media:Article (Journal)
-
Type of material:Print
-
Language:English
-
Keywords:
-
Source:
Table of contents – Volume 45
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
- 1
-
Taxonomy of intrusion risk assessment and response systemShameli-Sendi, Alireza / Cheriet, Mohamed / Hamou-Lhadj, Abdelwahab et al. | 2014
- 17
-
Uniform DoS tracebackAlenezi, Mohammed N. / Reed, Martin J. et al. | 2014
- 27
-
An approach for profiling phishing activitiesHamid, Isredza Rahmi A. / Abawajy, Jemal H. et al. | 2014
- 42
-
Information security incident management: Current practice as reported in the literatureTøndel, Inger Anne / Line, Maria B. / Jaatun, Martin Gilje et al. | 2014
- 58
-
A multi-level approach to understanding the impact of cyber crime on the financial sectorLagazio, Monica / Sherif, Nazneen / Cushman, Mike et al. | 2014
- 75
-
Bluetooth Command and Control channelPieterse, Heloise / Olivier, Martin S. et al. | 2014
- 84
-
On the security of text-based 3D CAPTCHAsNguyen, Vu Duc / Chow, Yang-Wai / Susilo, Willy et al. | 2014
- 100
-
An empirical comparison of botnet detection methodsGarcía, S. / Grill, M. / Stiborek, J. / Zunino, A. et al. | 2014
- 124
-
Ontology for attack detection: An intelligent approach to web application securityRazzaq, Abdul / Anwar, Zahid / Ahmad, H. Farooq / Latif, Khalid / Munir, Faisal et al. | 2014
- 147
-
Soft biometrics for keystroke dynamics: Profiling individuals while typing passwordsSyed Idrus, Syed Zulkarnain / Cherrier, Estelle / Rosenberger, Christophe / Bours, Patrick et al. | 2014
- 156
-
Performance evaluation of anomaly-detection algorithms for mouse dynamicsShen, Chao / Cai, Zhongmin / Guan, Xiaohong / Maxion, Roy et al. | 2014
- 172
-
Complexity is dead, long live complexity! How software can help service providers manage security and complianceThalmann, Stefan / Bachlechner, Daniel / Demetz, Lukas / Manhart, Markus et al. | 2014
- 186
-
A practical solution for sealed bid and multi-currency auctionsMontenegro, Jose A. / Lopez, Javier et al. | 2014
- 199
-
Location leakage in distance bounding: Why location privacy does not workMitrokotsa, Aikaterini / Onete, Cristina / Vaudenay, Serge et al. | 2014
- 210
-
Towards optimal noise distribution for privacy preserving in data aggregationZhang, Hao / Yu, Nenghai / Wen, Yonggang / Zhang, Weiming et al. | 2014
- 231
-
Selection of Candidate Support Vectors in incremental SVM for network intrusion detectionChitrakar, Roshan / Huang, Chuanhe et al. | 2014
- 242
-
HTTP attack detection using n-gram analysisOza, Aditya / Ross, Kevin / Low, Richard M. / Stamp, Mark et al. | 2014
- 255
-
Design guidelines for security protocols to prevent replay & parallel session attacksJurcut, Anca D. / Coffey, Tom / Dojen, Reiner et al. | 2014
- 274
-
Shadow IT – A view from behind the curtainSilic, Mario / Back, Andrea et al. | 2014
- 284
-
A comparative analysis of detection metrics for covert timing channelsArchibald, Rennie / Ghosal, Dipak et al. | 2014
- 293
-
Time and space interval record schedule consistency analysis for atomic items without interactions in open spaces with stationary locationsCohen, Fred / Cohen, Don et al. | 2014
- 305
-
Securing cloud and mobility: A practitioner's guideTsalis, Nikolaos / Gritzalis, Dimitris et al. | 2014
- IFC
-
Editorial Board| 2014
- iii
-
Contents| 2014