Results 71 to 80 of about 28,210 (305)

Code Layering for the Detection of Network Covert Channels in Agentless Systems [PDF]

open access: hybrid, 2022
Marco Zuppelli   +4 more
openalex   +1 more source

Value of MRI Outcomes for Preventive and Early‐Stage Trials in Spinocerebellar Ataxias 1 and 3

open access: yesAnnals of Clinical and Translational Neurology, EarlyView.
ABSTRACT Objective To examine the value of MRI outcomes as endpoints for preventive and early‐stage trials of two polyglutamine spinocerebellar ataxias (SCAs). Methods A cohort of 100 participants (23 SCA1, 63 SCA3, median Scale for the Assessment and Rating of Ataxia (SARA) score = 5, 42% preataxic, and 14 gene‐negative controls) was scanned at 3T up ...
Thiago J. R. Rezende   +26 more
wiley   +1 more source

A Blockchain-Enabled Group Covert Channel against Transaction Forgery

open access: yesMathematics
As a decentralized network infrastructure, the data sent to the blockchain are public and temper-evident. The cover of massive normal transactions in a blockchain network is ideal for constructing a stable and reliable covert channel to achieve one-to ...
Tongzhou Shen   +5 more
doaj   +1 more source

Distributed data hiding in multi-cloud storage environment

open access: yesJournal of Cloud Computing: Advances, Systems and Applications, 2020
Classical or traditional steganography aims at hiding a secret in cover media such as text, image, audio, video or even in network protocols. Recent research has improved this approach called distributed steganography by fragmenting the secret message ...
Leonel Moyou Metcheka, René Ndoundam
doaj   +1 more source

A Scoping Review on Artificial Intelligence–Supported Interventions for Nonpharmacologic Management of Chronic Rheumatic Diseases

open access: yesArthritis Care &Research, EarlyView.
This review summarizes artificial intelligence (AI)‐supported nonpharmacological interventions for adults with chronic rheumatic diseases, detailing their components, purpose, and current evidence base. We searched Embase, PubMed, Cochrane, and Scopus databases for studies describing AI‐supported interventions for adults with chronic rheumatic diseases.
Nirali Shah   +5 more
wiley   +1 more source

Effect of Foot Orthoses on Midfoot Pain and the Volume of Bone Marrow Lesions in the Midfoot: A Randomized Mechanism of Action Study

open access: yesArthritis Care &Research, EarlyView.
Objective Foot orthoses are thought to improve pain by potentially modifying internal mechanical forces. To test this, we explored whether foot orthoses can modify patterns of bone marrow lesions (BMLs) in people with midfoot pain. Methods Forty‐two people were recruited with midfoot pain, and magnetic resonance imaging–confirmed midfoot BMLs ...
Jill Halstead   +4 more
wiley   +1 more source

Detection of IP Covert Timing Channels

open access: yesБезопасность информационных технологий, 2015
Covert timing channels became widespread with the increasing popularity of packet switching networks. Detection of these channels is the only approach to counter that does not lead to a decrease of channel’s capacity. Known methods of the IP covert timing channels detection were systematized.
Konstantin Grigorievich Kogos   +1 more
openaire   +1 more source

Clinical Practice Guideline for Evaluation and Management of Peripheral Nervous System Manifestations in Sjögren's Disease

open access: yesArthritis Care &Research, Accepted Article.
Objectives Sjögren's disease is an autoimmune disorder that can impact multiple organ systems, including the peripheral nervous system (PNS). PNS manifestations, which can exist concurrently, include mononeuropathies, polyneuropathies, and autonomic nervous system neuropathies. To help patients and providers in the decision‐making process, we developed
Anahita Deboo   +19 more
wiley   +1 more source

Virtual machine co-residency method on cloud computing platform

open access: yesTongxin xuebao, 2018
If the attacker wants to compromise a target virtual machine on a cloud platform,the malicious virtual machine must be co-resident with the target.Based on this,a virtual machine co-residency method was proposed.The method combined a co-residency ...
Weijie LIU   +4 more
doaj   +2 more sources

Exploiting Temporal Variability in TCP Timestamps for Covert Channel Design

open access: yesIEEE Access
Information is a valuable asset for individuals, organizations, and governments, making secure transmission a critical concern. Cryptographic techniques are widely used to protect communication; however, in scenarios where the mere detection of ...
Silvio R. A. O. Filho   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy