Results 71 to 80 of about 349,876 (317)

Covert Bits Through Queues

open access: yes, 2016
We consider covert communication using a queuing timing channel in the presence of a warden. The covert message is encoded using the inter-arrival times of the packets, and the legitimate receiver and the warden observe the inter-departure times of the ...
Mukherjee, Pritam, Ulukus, Sennur
core   +1 more source

Predicting Chronicity in Children and Adolescents With Newly Diagnosed Immune Thrombocytopenia at the Timepoint of Diagnosis Using Machine Learning‐Based Approaches

open access: yesPediatric Blood &Cancer, EarlyView.
ABSTRACT Objectives To identify predictors of chronic ITP (cITP) and to develop a model based on several machine learning (ML) methods to estimate the individual risk of chronicity at the timepoint of diagnosis. Methods We analyzed a longitudinal cohort of 944 children enrolled in the Intercontinental Cooperative immune thrombocytopenia (ITP) Study ...
Severin Kasser   +6 more
wiley   +1 more source

Performance analysis of covert wireless communication based on beam forming with noise uncertainty

open access: yesTongxin xuebao, 2020
In order to establish covert wireless communication in Rayleigh fading environment with noise uncertainty,a scheme of downlink covert wireless communication based on complex Gaussian random coding and beam forming was adopted,and more importantly,the ...
Yuda LIN   +3 more
doaj   +2 more sources

ESO Guideline on covert cerebral small vessel disease

open access: yesEuropean Stroke Journal, 2021
‘Covert’ cerebral small vessel disease (ccSVD) is common on neuroimaging in persons without overt neurological manifestations, and increases the risk of future stroke, cognitive impairment, dependency, and death.
J. Wardlaw   +15 more
semanticscholar   +1 more source

Covert Channel Establishment Through the Dynamic Adaptation of the Sequential Probability Ratio Test to Sensor Data in IoT

open access: yesIEEE Access, 2019
Owing to their hidden natures, covert channels can be utilized such that trojan applications can communicate stealthily with each other or exchange stolen private information without being revealed.
Jun-Won Ho
doaj   +1 more source

Network covert channels capacity limitation by adding random delays before packet sending

open access: yesБезопасность информационных технологий, 2021
Attention to covert channels has largely increased due to the documents published by E. Snowden, which described the software and hardware embedding that implement undeclared features of covert information transfer in the Huawei and Juniper network ...
Anna I. Belozubova   +2 more
doaj   +1 more source

Compulsory moral bioenhancement should be covert [PDF]

open access: yes, 2018
Some theorists argue that moral bioenhancement ought to be compulsory. I take this argument one step further, arguing that if moral bioenhancement ought to be compulsory, then its administration ought to be covert rather than overt.
Crutchfield, Parker
core  

Covert Capacity of Non-Coherent Rayleigh-Fading Channels

open access: yes, 2019
The covert capacity is characterized for a non-coherent fast Rayleigh-fading wireless channel, in which a legitimate user wishes to communicate reliably with a legitimate receiver while escaping detection from a warden.
Bloch, Matthieu R.   +2 more
core   +2 more sources

Psychological Safety Among Interprofessional Pediatric Oncology Teams in Germany: A Nationwide Survey

open access: yesPediatric Blood &Cancer, EarlyView.
ABSTRACT Background Psychological safety (PS) is essential for teamwork, communication, and patient safety in complex healthcare environments. In pediatric oncology, interprofessional collaboration occurs under high emotional and organizational demands. Low PS may increase stress, burnout, and adverse events.
Alexandros Rahn   +4 more
wiley   +1 more source

An Enlarging-the-Capacity Packet Sorting Covert Channel

open access: yesIEEE Access, 2019
The construction method of the covert channel has always been a topic of research and exploration in the field of information security, and the use of IP data packets for covert channel construction is also an important method. Based on the above content,
Lejun Zhang   +4 more
doaj   +1 more source

Home - About - Disclaimer - Privacy