Login / Signup
An Experience Using Two Covert Channel Analysis Techniques on a Real System Design.
J. Thomas Haigh
Richard A. Kemmerer
John McHugh
William D. Young
Published in:
IEEE Symposium on Security and Privacy (1986)
Keyphrases
</>
data analysis
case study
design process
design thinking