[1] |
GIRLING C G. Covert Channels in LAN's[J]. IEEE Transactions on Software Engineering, 1987, 13(2):292-296.
|
[2] |
LIU G, YANG W, LIU W, et al. Designing S-Boxes Based on 3-D Four-Wing Autonomous Chaotic System[J]. Nonlinear Dynamics, 2015, 82(4):1867-1877.
doi: 10.1007/s11071-015-2283-y
|
[3] |
SODERI S, MUCCHI L, HÄMÄLÄINEN M, et al. Physical Layer Security Based on Spread-Spectrum Watermarking and Jamming Receiver[J]. Transactions on Emerging Telecommunications Technologies, 2016, 27(12):e3142.
|
[4] |
SHU F, XU L, WANG J, et al. Artificial-Noise-Aided Secure Multicast Precoding for Directional Modulation Systems[J]. IEEE Transactions on Vehicular Technology, 2018, 67(7):6658-6662.
doi: 10.1109/TVT.2018.2799640
|
[5] |
LIU J, CHEN W, WEN Y. A Robust and Flexible Covert Channel in LTE-A System[J]. Journal of Physics:Conference Series, 2018, 1087(6):062027.
doi: 10.1088/1742-6596/1087/6/062027
|
[6] |
XU G, YANG W, HUANG L. Hybrid Covert Channel in LTE-A:Modeling and Analysis[J]. Journal of Network and Computer Applications, 2018, 111:117-126.
doi: 10.1016/j.jnca.2018.02.001
|
[7] |
WANG Z, HUANG L, YANG W, et al. An Entropy-Based Method for Detection of Covert Channels over LTE[C]/// 2018 IEEE 22nd International Conference on Computer Supported Cooperative Work in Design ((CSCWD)).Piscataway:IEEE, 2018:872-877.
|
[8] |
NAINA K, RAJALAKSHMI P. A Reliable Covert Channel over IEEE 802.15.4 Using Steganography[C]// 2016 IEEE 3rd World Forum on Internet of Things (WF-IoT).Piscataway:IEEE, 2016:711-716.
|
[9] |
HARLEYP M B, TUMMALA M, MCEACHEN J C. High-Throughput Covert Channels in Adaptive Rate Wireless Communication Systems[C]// 2019 International Conference on Electronics,Information,and Communication (ICEIC).Piscataway:IEEE, 2019:1-7.
|
[10] |
DUTTA A, SAHA D, GRUNWALD D, et al. Secret Agent Radio:Covert Communication through Dirty Constellations[C]/// International Conference on Information Hiding.Heidelberg:Springer, 2012:160-175.
|
[11] |
KITANO T, IWAI H, SASAOKA H. A Wireless Steganography Technique by Embedding DS-SS Signal in Digital Mobile Communication Systems[J]. Science & Engineering Review of Doshisha University, 2011, 52:127-134.
|
[12] |
CLASSEN J, SCHULZ M, HOLLICK M. Practical Covert Channels for WiFi Systems[C]// 2015 IEEE Conference on Communications and Network Security (CNS).Piscataway:IEEE, 2015:209-217.
|
[13] |
HIJAZ Z, FROST V S. Exploiting OFDM Systems for Covert Communication[C]// 2010-Milcom 2010 Military Communications Conference.Piscataway:IEEE, 2010:2149-2155.
|
[14] |
CAO P, LIU W, LIU G, et al. A Wireless Covert Channel Based on Constellation Shaping Modulation[J]. Security & Communication Networks, 2018, 2018:1-15.
|
[15] |
WANG X, LIU Y, LU X, et al. CovertMIMO:A Covert Uplink Transmission Scheme for MIMO Systems[C]// 2017 IEEE International Conference on Communications (ICC).Piscataway:IEEE, 2017:1-6.
|
[16] |
HOKAI K, SASAOKA H, IWAI H. Wireless Steganography Using MIMO System[C]// IEEE 5th International Conference on Communications and Electronics.Piscataway:IEEE, 2014:560-565.
|
[17] |
LIU W, LIU G, ZHAI J, et al. Designing Analog Fountain Timing Channels:Undetectability,Robustness,and Model-Adaptation[J]. IEEE Transactions on Information Forensics and Security, 2016, 11(4):677-690.
doi: 10.1109/TIFS.2015.2505688
|
[18] |
IEEE. 802.11a-1999-IEEE Standard for Telecommunications and Information Exchange Between Systems-LAN/MAN Specific Requirements-Part 11:Wireless Medium Access Control (MAC) and Physical Layer (PHY) Specifications:High Speed Physical Layer in the 5 GHz band[S]. Piscataway:IEEE, 2003.
|