Results 71 to 80 of about 28,210 (305)
Code Layering for the Detection of Network Covert Channels in Agentless Systems [PDF]
Marco Zuppelli +4 more
openalex +1 more source
Value of MRI Outcomes for Preventive and Early‐Stage Trials in Spinocerebellar Ataxias 1 and 3
ABSTRACT Objective To examine the value of MRI outcomes as endpoints for preventive and early‐stage trials of two polyglutamine spinocerebellar ataxias (SCAs). Methods A cohort of 100 participants (23 SCA1, 63 SCA3, median Scale for the Assessment and Rating of Ataxia (SARA) score = 5, 42% preataxic, and 14 gene‐negative controls) was scanned at 3T up ...
Thiago J. R. Rezende +26 more
wiley +1 more source
A Blockchain-Enabled Group Covert Channel against Transaction Forgery
As a decentralized network infrastructure, the data sent to the blockchain are public and temper-evident. The cover of massive normal transactions in a blockchain network is ideal for constructing a stable and reliable covert channel to achieve one-to ...
Tongzhou Shen +5 more
doaj +1 more source
Distributed data hiding in multi-cloud storage environment
Classical or traditional steganography aims at hiding a secret in cover media such as text, image, audio, video or even in network protocols. Recent research has improved this approach called distributed steganography by fragmenting the secret message ...
Leonel Moyou Metcheka, René Ndoundam
doaj +1 more source
This review summarizes artificial intelligence (AI)‐supported nonpharmacological interventions for adults with chronic rheumatic diseases, detailing their components, purpose, and current evidence base. We searched Embase, PubMed, Cochrane, and Scopus databases for studies describing AI‐supported interventions for adults with chronic rheumatic diseases.
Nirali Shah +5 more
wiley +1 more source
Objective Foot orthoses are thought to improve pain by potentially modifying internal mechanical forces. To test this, we explored whether foot orthoses can modify patterns of bone marrow lesions (BMLs) in people with midfoot pain. Methods Forty‐two people were recruited with midfoot pain, and magnetic resonance imaging–confirmed midfoot BMLs ...
Jill Halstead +4 more
wiley +1 more source
Detection of IP Covert Timing Channels
Covert timing channels became widespread with the increasing popularity of packet switching networks. Detection of these channels is the only approach to counter that does not lead to a decrease of channel’s capacity. Known methods of the IP covert timing channels detection were systematized.
Konstantin Grigorievich Kogos +1 more
openaire +1 more source
Objectives Sjögren's disease is an autoimmune disorder that can impact multiple organ systems, including the peripheral nervous system (PNS). PNS manifestations, which can exist concurrently, include mononeuropathies, polyneuropathies, and autonomic nervous system neuropathies. To help patients and providers in the decision‐making process, we developed
Anahita Deboo +19 more
wiley +1 more source
Virtual machine co-residency method on cloud computing platform
If the attacker wants to compromise a target virtual machine on a cloud platform,the malicious virtual machine must be co-resident with the target.Based on this,a virtual machine co-residency method was proposed.The method combined a co-residency ...
Weijie LIU +4 more
doaj +2 more sources
Exploiting Temporal Variability in TCP Timestamps for Covert Channel Design
Information is a valuable asset for individuals, organizations, and governments, making secure transmission a critical concern. Cryptographic techniques are widely used to protect communication; however, in scenarios where the mere detection of ...
Silvio R. A. O. Filho +3 more
doaj +1 more source

