共 16 条
- [1] Ahsan K., 2002, P WORKSHOP MULTIMEDI, VVolume 2, P1
- [2] Cabuk S., 2004, P 11 ACM C COMP COMM, P178, DOI DOI 10.1145/1030083.1030108
- [3] Epishkina A., 2015, P 5 INT C IT CONV SE, P395
- [4] Epishkina A., 2015, P 2015 FED C COMP SC, P1119
- [5] COVERT CHANNELS IN LANS [J]. IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 1987, 13 (02) : 292 - 296
- [6] SHARED RESOURCE MATRIX METHODOLOGY - AN APPROACH TO IDENTIFYING STORAGE AND TIMING CHANNELS [J]. ACM TRANSACTIONS ON COMPUTER SYSTEMS, 1983, 1 (03): : 256 - 277
- [7] Kiraly C., 2008, INT FEDERATION INFOR, V262
- [9] Millen J. K., 1987, Proceedings of the 1987 IEEE Symposium on Security and Privacy (Cat. No.87CH2416-6), P60
- [10] Padlipsky M. A., 1978, Tech. Rep. ESD-TR-78-158