Robust Network Covert Communications Based on TCP and Enumerative Combinatorics.
Xiapu LuoEdmond W. W. ChanPeng ZhouRocky K. C. ChangPublished in: IEEE Trans. Dependable Secur. Comput. (2012)
Keyphrases
- communication networks
- computer networks
- network configuration
- distributed network
- information flow
- key players
- network management
- peer to peer
- complex networks
- internet protocol
- tcp ip
- ip traffic
- neural network
- round trip
- link layer
- communication patterns
- ip networks
- network design
- community structure
- end to end
- network structure
- response time
- wireless sensor networks