Login / Signup

An Entropy-Based Approach to Detecting Covert Timing Channels.

Steven GianvecchioHaining Wang
Published in: IEEE Trans. Dependable Secur. Comput. (2011)
Keyphrases
  • mutual information
  • information flow
  • information entropy
  • databases
  • data mining
  • information theory
  • neural network
  • knowledge base
  • metadata
  • case study
  • relational databases
  • image registration
  • key players