Results 251 to 260 of about 28,210 (305)
On the performance of active RIS-enhanced NOMA systems with spectrum sharing mechanisms. [PDF]
Tran M, Bui Vu M, Nguyen SQ.
europepmc +1 more source
Covert channel analysis and detection using reverse proxy servers.
William J. Buchanan, David Llamas
openalex +1 more source
Secrecy Rate Maximization for Movable Antenna-Aided STAR-RIS in Integrated Sensing and Communication Systems. [PDF]
Chen G +6 more
europepmc +1 more source
Neural dynamics of covert habit activation and control in humans
Buabang EK +8 more
europepmc +1 more source
Covert channel detection using Information Theory [PDF]
In Proceedings SecCo 2010, arXiv:1102 ...
H��lou��t, Lo��c +1 more
openaire +2 more sources
Some of the next articles are maybe not open access.
Related searches:
Related searches:
Detecting covert timing channels
Proceedings of the 14th ACM conference on Computer and communications security, 2007The detection of covert timing channels is of increasing interest in light of recent practice on the exploitation of covert timing channels over the Internet. However, due to the high variation in legitimate network traffic, detecting covert timing channels is a challenging task.
Steven Gianvecchio, Haining Wang
openaire +1 more source
ACM Transactions on Information and System Security, 2009
A covert channel can occur when an attacker finds and exploits a shared resource that is not designed to be a communication mechanism. A network covert channel operates by altering the timing of otherwise legitimate network traffic so that the arrival times of packets encode confidential data that an attacker wants to exfiltrate from a secure area from
Serdar Cabuk +2 more
openaire +1 more source
A covert channel can occur when an attacker finds and exploits a shared resource that is not designed to be a communication mechanism. A network covert channel operates by altering the timing of otherwise legitimate network traffic so that the arrival times of packets encode confidential data that an attacker wants to exfiltrate from a secure area from
Serdar Cabuk +2 more
openaire +1 more source
Detecting protocol switching covert channels
37th Annual IEEE Conference on Local Computer Networks, 2012Network covert channels enable hidden communication and can be used to break security policies. Within the last years, new techniques for such covert channels arose, including protocol switching covert channels (PSCCs). PSCCs transfer hidden information by sending network packets with different selected network protocols.
Steffen Wendzel, Sebastian Zander
openaire +1 more source
WLAN covert timing channel detection
2015 Wireless Telecommunications Symposium (WTS), 2015Wireless LANs have been widely used to carry out a system to access Internet. WLAN security becomes mission one, especially a new type of attacks called covert channel based attack surfaced over the past few years. This attack uses different data rates provided in WLAN to transmit a secret message.
Hong Zhao, Minxiou Chen
openaire +1 more source

