Login / Signup
Covert Messaging through TCP Timestamps.
John Giffin
Rachel Greenstadt
Peter Litwack
Richard Tibbetts
Published in:
Privacy Enhancing Technologies (2002)
Keyphrases
</>
neural network
end to end
information flow
round trip
ip networks
flow control
temporal information
news articles
congestion control
high speed
fault tolerant
tcp ip
packet switched
terrorist networks
video streaming
distributed object oriented
genetic algorithm
publish subscribe
network analysis
case study
transport layer
real time
database