Results 31 to 40 of about 28,210 (305)

Identification of DNS covert channel based on improved convolutional neural network

open access: yesTongxin xuebao, 2020
In order to effectively identify the multiple types of DNS covert channels,the implementation of different sorts of DNS covert channel software was studied,and a detection based on the improved convolutional neural network was proposed.The experimental ...
Meng ZHANG, Haoliang SUN, Peng YANG
doaj   +2 more sources

Covert sensing using floodlight illumination [PDF]

open access: yes, 2018
We propose a scheme for covert active sensing using floodlight illumination from a THz-bandwidth amplified spontaneous emission (ASE) source and heterodyne detection.
Bash, Boulat A.   +4 more
core   +3 more sources

Proactive Eavesdropping via Covert Pilot Spoofing Attack in Multi-Antenna Systems

open access: yesIEEE Access, 2019
Proactive eavesdropping is an effective method for government to monitor suspicious users who are deemed to misuse communication systems for illegal activities. In this paper, considering that a legitimate full-duplex (FD) eavesdropper tries to monitor a
Xingbo Lu   +3 more
doaj   +1 more source

Performance Comparison of Relay-Based Covert Communications: DF, CF and AF

open access: yesSensors, 2023
In this paper, we investigate the performance of covert communications in different types of a relay system: decode-and-forward (DF), compress-and-forward (CF) and amplify-and-forward (AF).
Jihwan Moon
doaj   +1 more source

Covertvasion: Depicting threats through covert channels based novel evasive attacks in android

open access: yesInternational Journal of Intelligent Networks, 2023
Privacy and security issues concerning mobile devices have substantial consequences for individuals, groups, governments, and businesses. The Android operating system bolsters smartphone data protection by imposing restrictions on app behavior ...
Sunil Gautam   +4 more
doaj   +1 more source

Inaudible sound covert channel with anti-jamming capability: Attacks vs. countermeasure

open access: yesJournal of Electronic Science and Technology, 2022
When an inaudible sound covert channel (ISCC) attack is launched inside a computer system, sensitive data are converted to inaudible sound waves and then transmitted.
Xiao-Hang Wang   +7 more
doaj   +1 more source

Combating Adversarial Covert Channels in Wi-Fi Networks

open access: yesIEEE Access, 2022
Physical layer covert channels exploit the characteristics of radio signals to convey secret messages while remaining inconspicuous within wireless channels.
Hoorin Park   +4 more
doaj   +1 more source

Covert Capacity of Non-Coherent Rayleigh-Fading Channels

open access: yes, 2019
The covert capacity is characterized for a non-coherent fast Rayleigh-fading wireless channel, in which a legitimate user wishes to communicate reliably with a legitimate receiver while escaping detection from a warden.
Bloch, Matthieu R.   +2 more
core   +2 more sources

USBcat - Towards an Intrusion Surveillance Toolset

open access: yes, 2014
This paper identifies an intrusion surveillance framework which provides an analyst with the ability to investigate and monitor cyber-attacks in a covert manner.
Chapman, Chris, Dean, Tom, Knight, Scott
core   +4 more sources

Secret key expansion from covert communication

open access: yes, 2017
Covert communication allows us to transmit messages in such a way that it is not possible to detect that the communication is occurring. This provides protection in situations where knowledge that people are talking to each other may be incriminating to ...
Amiri, Ryan, Arrazola, Juan Miguel
core   +1 more source

Home - About - Disclaimer - Privacy