Sign in

WindTalker: An Efficient and Robust Protocol of Cloud Covert Channel Based on Memory Deduplication.

Hong RongHuimei WangJian LiuXiaochen ZhangMing Xian
Published in: BDCloud (2015)
Keyphrases
  • software architecture
  • covert channel
  • security requirements
  • distributed systems
  • computationally efficient
  • databases
  • software development
  • cloud computing
  • association rules