Login / Signup

Constructing the On/Off Covert Channel on Xen.

Yetian XiaXiaochao ZiLihong YaoLi PanJianhua Li
Published in: CIS (2012)
Keyphrases
  • covert channel
  • security requirements
  • artificial intelligence
  • network traffic
  • distributed systems
  • intrusion detection