参考文献/References:
[1] 冯登国,张敏,李昊.大数据安全与隐私保护[J].计算机学报,2014,37(1):246-258.
Feng Dengguo, Zhang Min, Li Hao. Big data security and privacy protection[J]. Chinese Journal of Computers, 2014, 37(1): 246-258.(in Chinese)
[2] 冯登国,张敏,张妍,等.云计算安全研究[J].软件学报,2011,22(1):71-83.
Feng Dengguo, Zhang Min, Zhang Yan, et al. Study on cloud computing security[J]. Journal of Software, 2011, 22(1): 71-83.(in Chinese)
[3] 谭庆丰,刘培朋,时金桥,等.UGC3:一种抵御审查的隐蔽通信方法[J].通信学报,2012,33(8):155-161.
Tan Qingfeng, Liu Peipeng, Shi Jinqiao, et al. UGC3: a covert communication method defense against censorship[J]. Journal on Communications, 2012, 33(8): 155-161.(in Chinese)
[4] Rios R, Onieva J A, Lopez J. Covert communications through network configuration messages[J]. Computers & Security, 2013, 39: 34-46.
[5] 章思宇,邹福泰,王鲁华,等.基于DNS的隐蔽通道流量检测[J].通信学报,2013,34(5):143-151.
Zhang Siyu, Zhou Futai, Wang Luhua, et al. Detecting DNS-based covert channel on live traffic[J]. Journal on Communications, 2013, 34(5): 143-151.(in Chinese)
[6] Cabuk S, Brodley C E, Shields C, et al. IP covert timing channels: design and detection[C]//Proceedings of the 11th ACM Conference on Computer and Communications Security. New York: ACM, 2004: 178-187.
[7] Archibald R, Ghosal D. A covert timing channel based on fountain codes[C]//2012 IEEE International Conference on Trust, Security and Privacy in Computing and Communications. Liverpool, UK, 2012: 970-977.
[8] 钱玉文,赵邦信,孔建寿,等.一种基于Web的可靠网络隐蔽时间信道的研究[J].计算机研究与发展,2011,48(3):423-431.
Qian Yuwen, Zhao Bangxin, Kong Jianshou, et al. Robust covert timing channel based on Web[J]. Journal of Computer Research and Development, 2011, 48(3): 423-431.(in Chinese)
[9] 牛小鹏,李清宝,王炜.一种基于扩频编码的可靠网络隐蔽信道设计方法[J].电子与信息学报,2013,35(4):1012-1016.
Niu Xiaopeng, Li Qingbao, Wang Wei. A robust network covert channel algorithm based on spread coding[J]. Journal of Electronics & Information Technology, 2013, 35(4): 1012-1016.(in Chinese)
[10] Zhang Z, Guo Z, Yang Y. Bounded-reorder packet scheduling in optical cut-through switch[C]//2013 IEEE INFOCOM. Turin, Italy, 2013: 701-709.
[11] Narasiodeyar R M, Jayasumana A P. Improvement in packet-reordering with limited re-sequencing buffers: an analysis[C]//2013 IEEE Conference on Local Computer Networks. Sydney, Australia, 2013: 416-424.
[12] Liu Y, Ghosal D, Armknecht F, et al. Robust and undetectable steganographic timing channels for i.i.d. traffic[C]//Information Hiding Conference. Calgary, Canada, 2010: 193-207.
[13] Giustiniano D, Lenders V, Schmitt J B, et al. Detection of reactive jamming in DSSS-based wireless networks[C]//Proceedings of the Sixth ACM Conference on Security and Privacy in Wireless and Mobile Networks. Budapest, Hungary, 2013: 43-48.
[14] 谢安,李冬红.概率论与数理统计[M].北京:清华大学出版社,2012:122-125.
[15] Netfilter Core Team. The netfilter.org “iptables” project [EB/OL].(2013-11-22)[2014-06-15]. http://www.netfilter.org./projects/iptables/index.html.