共 29 条
[1]
Vishnoi A., Mishra P., Negi C., Peddoju S.K., Android malware detection techniques in traditional and cloud computing platforms: a state-of-the-art survey, Int. J. Cloud Appl. Comput. (IJCAC), 11, 4, pp. 113-135, (2021)
[2]
Android content license
[3]
Tian J., Xiong G., Li Z., Gou G., A Survey of Key Technologies for Constructing Network Covert Channel, pp. 1-20, (2020)
[4]
Lou X., Zhang T., Jiang J., Zhang Y., A survey of microarchitectural side-channel vulnerabilities, attacks, and defenses in cryptography, ACM Comput. Surv., 54, 6, pp. 1-37, (2021)
[5]
Guri M., Bykhovsky D., Air-jumper: covert air-gap exfiltration/infiltration via security cameras & infrared (ir), Comput. Secur., 82, pp. 15-29, (2019)
[6]
Dua A., Jindal V., Bedi P., Covert communication using address resolution protocol broadcast request messages, 9th international conference on reliability, infocom technologies and optimization (trends and future directions)(ICRITO), IEEE, pp. 1-6, (2021)
[7]
Mazurczyk W., Wendzel S., Zander S., Houmansadr A., Szczypiorski K., Information Hiding in Communication Networks: Fundamentals, Mechanisms, Applications, and Countermeasures, (2016)
[8]
Li P., Li J., Huang Z., Gao C.Z., Chen W.B., Chen K., Privacy-preserving outsourced classification in cloud computing, Cluster Comput., 21, pp. 277-286, (2018)
[9]
Kumar R., Goyal R., On cloud security requirements, threats, vulnerabilities and countermeasures: a survey, Comput. Sci. Rev., 33, pp. 1-48, (2019)
[10]
Zhao H., Chen M., WLAN covert timing channel detection, 2015 Wireless Telecommunications Symposium (WTS), IEEE, pp. 1-5, (2015)