Results 41 to 50 of about 349,876 (317)

COVERT CHANNEL TECHNIQUE BASED ON STREAMING PROTOCOL [PDF]

open access: yesНаучно-технический вестник информационных технологий, механики и оптики, 2018
The paper presents analysis of modern network covert channels. The authors set forward a hypothesis of effective streaming protocol usage for covert channel creating. Covert channel technique for open networks is proposed.
Shipulin P.M., Kozin V.V, Shniperov A.N.
doaj   +1 more source

Covert channel detection using Information Theory

open access: yes, 2010
This paper presents an information theory based detection framework for covert channels. We first show that the usual notion of interference does not characterize the notion of deliberate information flow of covert channels.
Hélouët, Loïc, Roumy, Aline
core   +3 more sources

Covert Wireless Communication with a Poisson Field of Interferers [PDF]

open access: yes, 2018
In this paper, we study covert communication in wireless networks consisting of a transmitter, Alice, an intended receiver, Bob, a warden, Willie, and a Poisson field of interferers.
He, Biao   +3 more
core   +5 more sources

Diagnosing covert hepatic encephalopathy [PDF]

open access: yesClinical Liver Disease, 2015
Watch a video presentation of this article Answer questions and earn CME
Munk Lauridsen, Mette, Vilstrup, Hendrik
openaire   +4 more sources

UAV Relay Assisted Cooperative Jamming for Covert Communications Over Rician Fading

open access: yesIEEE Transactions on Vehicular Technology, 2022
Covert communication can hide the legitimate transmission from unauthorized eavesdropping. Benefiting from the deployment flexibility, unmanned aerial vehicles (UAVs) can be utilized to enhance communication confidentiality.
Ran Zhang   +5 more
semanticscholar   +1 more source

Covert Communication in Fading Channels under Channel Uncertainty [PDF]

open access: yes, 2017
A covert communication system under block fading channels is considered where users experience uncertainty about their channel knowledge. The transmitter seeks to hide the covert communication to a private user by exploiting a legitimate public ...
Shahzad, Khurram   +2 more
core   +2 more sources

MD-GAN-Based UAV Trajectory and Power Optimization for Cognitive Covert Communications

open access: yesIEEE Internet of Things Journal, 2022
This article investigates the covert performance of an unmanned aerial vehicle (UAV) jammer-assisted cognitive radio (CR) network. In particular, the covert transmission of secondary users can be effectively protected by UAV jamming against the ...
Zan Li   +4 more
semanticscholar   +1 more source

Intelligent Reflecting Surface (IRS)-Aided Covert Wireless Communications With Delay Constraint [PDF]

open access: yesIEEE Transactions on Wireless Communications, 2020
This work examines the performance gain achieved by deploying an intelligent reflecting surface (IRS) in covert communications. To this end, we formulate the joint design of the transmit power and the IRS reflection coefficients by taking into account ...
Xiaobo Zhou   +4 more
semanticscholar   +1 more source

A Quality Improvement Initiative to Standardize Pneumocystis jirovecii Pneumonia Prophylaxis in Pediatric Patients With Solid Tumors

open access: yesPediatric Blood &Cancer, EarlyView.
ABSTRACT Background Pediatric patients with extracranial solid tumors (ST) receiving chemotherapy are at an increased risk for Pneumocystis jirovecii pneumonia (PJP). However, evidence guiding prophylaxis practices in this population is limited. A PJP‐related fatality at our institution highlighted inconsistent prescribing approaches and concerns about
Kriti Kumar   +8 more
wiley   +1 more source

A Covert Channel Over VoLTE via Adjusting Silence Periods

open access: yesIEEE Access, 2018
Covert channels represent unforeseen communication methods that exploit authorized overt communication as the carrier medium for covert messages. Covert channels can be a secure and effective means of transmitting confidential information hidden in overt
Xiaosong Zhang   +4 more
doaj   +1 more source

Home - About - Disclaimer - Privacy