Covert Messaging through TCP Timestamps.
John GiffinRachel GreenstadtPeter LitwackRichard TibbettsPublished in: Privacy Enhancing Technologies (2002)
Keyphrases
- neural network
- end to end
- information flow
- round trip
- ip networks
- flow control
- temporal information
- news articles
- congestion control
- high speed
- fault tolerant
- tcp ip
- packet switched
- terrorist networks
- video streaming
- distributed object oriented
- genetic algorithm
- publish subscribe
- network analysis
- case study
- transport layer
- real time
- database