..............page:455-460
..............page:427-434
..............page:393-401
..............page:418-426
..............page:402-406
G Bytes Data Hiding Method Based on Cluster Chain Structure
NIU Xiaopeng 1;2;LI Qingbao 1;2;WANG Wei 1;2;WANG Yulong 1;2 1. State Key Laboratory of Mathematical Engineering and Advanced Computing;Zhengzhou 450002;Henan;China;2. PLA Information Engineering University;Zhengzhou 450001;Henan;China
..............page:443-448
..............page:435-442
..............page:449-454
..............page:385-392
Information Transfer Model of Virtual Machine Based on Storage Covert Channel
WANG Xiaorui 1;WANG Qingxian 2;GUO Yudong 1;LU Jianping 3 1. Fourth Department;PLA Information Engineering University;Zhengzhou 450002;Henan;China;2. State Key Laboratory of Mathematical Engineering and Advanced Computing;Zhengzhou 450002;Henan;China;3. Department of Communication Command;Chongqing Communication Institute;Chongqing 400035;China
..............page:377-384
..............page:407-412
..............page:413-417
An Unknown Trojan Detection Method Based on Software Network Behavior
LIANG Yu 1;PENG Guojun 1;2;ZHANG Huanguo 1;WANG Ying 1 1. School of Computer/Key Laboratory of Aerospace Information Security and Trusted Computing of Ministry of Education;Wuhan University;Wuhan 430072;Hubei;China;2. Law School;Renmin University of China;Beijing 100872;China
..............page:369-376