Login / Signup
An Entropy-Based Approach to Detecting Covert Timing Channels.
Steven Gianvecchio
Haining Wang
Published in:
IEEE Trans. Dependable Secur. Comput. (2011)
Keyphrases
</>
mutual information
information flow
information entropy
databases
data mining
information theory
neural network
knowledge base
metadata
case study
relational databases
image registration
key players