{"id":"https://openalex.org/W2039953070","doi":"https://doi.org/10.1109/icc.2014.6883420","title":"Towards a unified model for the analysis of timing-based covert channels","display_name":"Towards a unified model for the analysis of timing-based covert channels","publication_year":2014,"publication_date":"2014-06-01","ids":{"openalex":"https://openalex.org/W2039953070","doi":"https://doi.org/10.1109/icc.2014.6883420","mag":"2039953070"},"language":"en","primary_location":{"id":"doi:10.1109/icc.2014.6883420","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icc.2014.6883420","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2014 IEEE International Conference on Communications (ICC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5109996077","display_name":"Pradhumna Lai Shrestha","orcid":null},"institutions":[{"id":"https://openalex.org/I114395901","display_name":"University of Nebraska\u2013Lincoln","ror":"https://ror.org/043mer456","country_code":"US","type":"education","lineage":["https://openalex.org/I114395901"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Pradhumna Lai Shrestha","raw_affiliation_strings":["Computer and Electronics Engineering Department, University of Nebraska - Lincoln, Omaha, NE, USA","Comput. & Electron. Eng. Dept., Univ. of Nebraska - Lincoln, Omaha, NE, USA"],"affiliations":[{"raw_affiliation_string":"Computer and Electronics Engineering Department, University of Nebraska - Lincoln, Omaha, NE, USA","institution_ids":["https://openalex.org/I114395901"]},{"raw_affiliation_string":"Comput. & Electron. Eng. Dept., Univ. of Nebraska - Lincoln, Omaha, NE, USA","institution_ids":["https://openalex.org/I114395901"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5041294451","display_name":"Michael Hempel","orcid":"https://orcid.org/0000-0002-7091-8349"},"institutions":[{"id":"https://openalex.org/I114395901","display_name":"University of Nebraska\u2013Lincoln","ror":"https://ror.org/043mer456","country_code":"US","type":"education","lineage":["https://openalex.org/I114395901"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Michael Hempel","raw_affiliation_strings":["Computer and Electronics Engineering Department, University of Nebraska - Lincoln, Omaha, NE, USA","Comput. & Electron. Eng. Dept., Univ. of Nebraska - Lincoln, Omaha, NE, USA"],"affiliations":[{"raw_affiliation_string":"Computer and Electronics Engineering Department, University of Nebraska - Lincoln, Omaha, NE, USA","institution_ids":["https://openalex.org/I114395901"]},{"raw_affiliation_string":"Comput. & Electron. Eng. Dept., Univ. of Nebraska - Lincoln, Omaha, NE, USA","institution_ids":["https://openalex.org/I114395901"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5032208035","display_name":"Hamid Sharif","orcid":"https://orcid.org/0000-0001-6229-2043"},"institutions":[{"id":"https://openalex.org/I114395901","display_name":"University of Nebraska\u2013Lincoln","ror":"https://ror.org/043mer456","country_code":"US","type":"education","lineage":["https://openalex.org/I114395901"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Hamid Sharif","raw_affiliation_strings":["Computer and Electronics Engineering Department, University of Nebraska - Lincoln, Omaha, NE, USA","Comput. & Electron. Eng. Dept., Univ. of Nebraska - Lincoln, Omaha, NE, USA"],"affiliations":[{"raw_affiliation_string":"Computer and Electronics Engineering Department, University of Nebraska - Lincoln, Omaha, NE, USA","institution_ids":["https://openalex.org/I114395901"]},{"raw_affiliation_string":"Comput. & Electron. Eng. Dept., Univ. of Nebraska - Lincoln, Omaha, NE, USA","institution_ids":["https://openalex.org/I114395901"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5109996077"],"corresponding_institution_ids":["https://openalex.org/I114395901"],"apc_list":null,"apc_paid":null,"fwci":1.636,"has_fulltext":false,"cited_by_count":7,"citation_normalized_percentile":{"value":0.87167677,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":97},"biblio":{"volume":null,"issue":null,"first_page":"816","last_page":"820"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9986000061035156,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9955000281333923,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/covert-channel","display_name":"Covert channel","score":0.7926323413848877},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7870041728019714},{"id":"https://openalex.org/keywords/covert","display_name":"Covert","score":0.6989576816558838},{"id":"https://openalex.org/keywords/leverage","display_name":"Leverage (statistics)","score":0.5412828922271729},{"id":"https://openalex.org/keywords/threat-model","display_name":"Threat model","score":0.529042661190033},{"id":"https://openalex.org/keywords/channel","display_name":"Channel (broadcasting)","score":0.46083953976631165},{"id":"https://openalex.org/keywords/network-security","display_name":"Network security","score":0.44930440187454224},{"id":"https://openalex.org/keywords/network-packet","display_name":"Network packet","score":0.4399341344833374},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.42073091864585876},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.4067358672618866},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.13381627202033997},{"id":"https://openalex.org/keywords/security-information-and-event-management","display_name":"Security information and event management","score":0.08842352032661438}],"concepts":[{"id":"https://openalex.org/C29024540","wikidata":"https://www.wikidata.org/wiki/Q1476964","display_name":"Covert channel","level":5,"score":0.7926323413848877},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7870041728019714},{"id":"https://openalex.org/C2779338814","wikidata":"https://www.wikidata.org/wiki/Q5179285","display_name":"Covert","level":2,"score":0.6989576816558838},{"id":"https://openalex.org/C153083717","wikidata":"https://www.wikidata.org/wiki/Q6535263","display_name":"Leverage (statistics)","level":2,"score":0.5412828922271729},{"id":"https://openalex.org/C140547941","wikidata":"https://www.wikidata.org/wiki/Q7797194","display_name":"Threat model","level":2,"score":0.529042661190033},{"id":"https://openalex.org/C127162648","wikidata":"https://www.wikidata.org/wiki/Q16858953","display_name":"Channel (broadcasting)","level":2,"score":0.46083953976631165},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.44930440187454224},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.4399341344833374},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.42073091864585876},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.4067358672618866},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.13381627202033997},{"id":"https://openalex.org/C103377522","wikidata":"https://www.wikidata.org/wiki/Q3493999","display_name":"Security information and event management","level":4,"score":0.08842352032661438},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0},{"id":"https://openalex.org/C184842701","wikidata":"https://www.wikidata.org/wiki/Q370563","display_name":"Cloud computing security","level":3,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icc.2014.6883420","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icc.2014.6883420","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2014 IEEE International Conference on Communications (ICC)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[{"id":"https://openalex.org/F4320306078","display_name":"U.S. Department of Defense","ror":"https://ror.org/0447fe631"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":15,"referenced_works":["https://openalex.org/W1471507","https://openalex.org/W9827866","https://openalex.org/W1495134838","https://openalex.org/W1587042134","https://openalex.org/W1804332683","https://openalex.org/W1993704367","https://openalex.org/W2052449747","https://openalex.org/W2106070341","https://openalex.org/W2125378579","https://openalex.org/W2139395674","https://openalex.org/W2150092124","https://openalex.org/W2151185692","https://openalex.org/W6600048306","https://openalex.org/W6600407745","https://openalex.org/W6629632223"],"related_works":["https://openalex.org/W2409612194","https://openalex.org/W4224042389","https://openalex.org/W174282171","https://openalex.org/W20460883","https://openalex.org/W1587013156","https://openalex.org/W1420645157","https://openalex.org/W4239080508","https://openalex.org/W2326198059","https://openalex.org/W4319780484","https://openalex.org/W4386088729"],"abstract_inverted_index":{"Covert":[0],"channels":[1,116,136],"are":[2],"a":[3,51,101,105,111,145],"network":[4,24,42],"security":[5,43,53],"risk":[6],"growing":[7],"both":[8],"in":[9],"sophistication":[10],"and":[11,13,22,60,70,157,163],"utilization,":[12],"thus":[14],"posing":[15],"an":[16,75],"increasing":[17],"threat.":[18],"They":[19],"leverage":[20],"benign":[21],"overt":[23],"activities,":[25],"such":[26,45,62],"as":[27,46],"the":[28,85,131,161],"modulation":[29],"of":[30,66,78,88,114,133,165],"packet":[31],"inter-arrival":[32],"time,":[33],"to":[34,84,97,129,148],"covertly":[35],"transmit":[36],"information":[37],"without":[38],"detection":[39],"by":[40],"current":[41],"approaches":[44],"firewalls.":[47],"This":[48,152],"makes":[49],"them":[50,99],"grave":[52],"concern.":[54],"Thus,":[55],"researching":[56],"methods":[57],"for":[58],"detecting":[59],"disrupting":[61],"covert":[63,79,89,115,135],"communication":[64],"is":[65,74,117,120],"utmost":[67],"importance.":[68],"Understanding":[69],"developing":[71],"analytical":[72],"models":[73,128],"essential":[76],"requirement":[77],"channel":[80,90],"analysis.":[81],"Unfortunately,":[82],"due":[83],"enormous":[86],"range":[87],"algorithms":[91],"available":[92],"it":[93],"becomes":[94],"very":[95],"inefficient":[96],"analyze":[98,130],"on":[100],"case-by-case":[102],"basis.":[103],"Hence,":[104],"unified":[106],"model":[107,147,153],"that":[108],"can":[109],"represent":[110],"wide":[112],"variety":[113],"required,":[118],"but":[119],"not":[121],"yet":[122],"available.":[123],"In":[124,140],"other":[125],"publications,":[126],"individual":[127],"capacity":[132],"interrupt-related":[134],"have":[137,159],"been":[138,155],"discussed.":[139],"our":[141,166],"work,":[142],"we":[143,158],"present":[144],"unique":[146],"unify":[149],"these":[150],"approaches.":[151],"has":[154],"analyzed":[156],"presented":[160],"results":[162],"verification":[164],"approach":[167],"using":[168],"MATLAB":[169],"simulations.":[170]},"counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":1},{"year":2015,"cited_by_count":3},{"year":2014,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
