Results 251 to 260 of about 28,210 (305)

Neural dynamics of covert habit activation and control in humans

open access: yes
Buabang EK   +8 more
europepmc   +1 more source

Covert channel detection using Information Theory [PDF]

open access: yesElectronic Proceedings in Theoretical Computer Science, 2011
In Proceedings SecCo 2010, arXiv:1102 ...
H��lou��t, Lo��c   +1 more
openaire   +2 more sources

Detecting covert timing channels

Proceedings of the 14th ACM conference on Computer and communications security, 2007
The detection of covert timing channels is of increasing interest in light of recent practice on the exploitation of covert timing channels over the Internet. However, due to the high variation in legitimate network traffic, detecting covert timing channels is a challenging task.
Steven Gianvecchio, Haining Wang
openaire   +1 more source

IP Covert Channel Detection

ACM Transactions on Information and System Security, 2009
A covert channel can occur when an attacker finds and exploits a shared resource that is not designed to be a communication mechanism. A network covert channel operates by altering the timing of otherwise legitimate network traffic so that the arrival times of packets encode confidential data that an attacker wants to exfiltrate from a secure area from
Serdar Cabuk   +2 more
openaire   +1 more source

Detecting protocol switching covert channels

37th Annual IEEE Conference on Local Computer Networks, 2012
Network covert channels enable hidden communication and can be used to break security policies. Within the last years, new techniques for such covert channels arose, including protocol switching covert channels (PSCCs). PSCCs transfer hidden information by sending network packets with different selected network protocols.
Steffen Wendzel, Sebastian Zander
openaire   +1 more source

WLAN covert timing channel detection

2015 Wireless Telecommunications Symposium (WTS), 2015
Wireless LANs have been widely used to carry out a system to access Internet. WLAN security becomes mission one, especially a new type of attacks called covert channel based attack surfaced over the past few years. This attack uses different data rates provided in WLAN to transmit a secret message.
Hong Zhao, Minxiou Chen
openaire   +1 more source

Home - About - Disclaimer - Privacy