Login / Signup

An Experience Using Two Covert Channel Analysis Techniques on a Real System Design.

J. Thomas HaighRichard A. KemmererJohn McHughWilliam D. Young
Published in: IEEE Symposium on Security and Privacy (1986)
Keyphrases
  • data analysis
  • case study
  • design process
  • design thinking