Results 11 to 20 of about 155,128 (235)

A Formulation of the Potential for Communication Condition using C2KA

open access: yes, 2014
An integral part of safeguarding systems of communicating agents from covert channel communication is having the ability to identify when a covert channel may exist in a given system and which agents are more prone to covert channels than others. In this
Jaskolka, Jason, Khedri, Ridha
core   +4 more sources

STAR-RIS Aided Covert Communications

open access: yesGLOBECOM 2023 - 2023 IEEE Global Communications Conference, 2023
This paper investigates the multi-antenna covert communications assisted by a simultaneously transmitting and reflecting reconfigurable intelligent surface (STAR-RIS). In particular, to shelter the existence of communications between transmitter and receiver from a warden, a friendly full-duplex receiver with two antennas is leveraged to make ...
Han Xiao   +6 more
openaire   +2 more sources

Adaptive image steganography based on optimal embedding and robust against chi-square attack [PDF]

open access: yes, 2011
A real-life requirement motivated this case study of secure covert communication. Steganography is a technique used to transfer hidden information in an imperceptible manner.
Ibrahim, Subariah, Zanganeh, Omid
core   +1 more source

Covert communications on Poisson packet channels [PDF]

open access: yes2015 53rd Annual Allerton Conference on Communication, Control, and Computing (Allerton), 2015
Allerton 2015 submission, minor edits ...
Ramin Soltani   +3 more
openaire   +2 more sources

Secret key expansion from covert communication

open access: yes, 2017
Covert communication allows us to transmit messages in such a way that it is not possible to detect that the communication is occurring. This provides protection in situations where knowledge that people are talking to each other may be incriminating to ...
Amiri, Ryan, Arrazola, Juan Miguel
core   +1 more source

Communication in a Poisson Field of Interferers -- Part II: Channel Capacity and Interference Spectrum [PDF]

open access: yes, 2007
In Part I of this paper, we presented a mathematical model for communication subject to both network interference and noise, where the interferers are scattered according to a spatial Poisson process, and are operating asynchronously in a wireless ...
Moe Z. Win   +2 more
core   +1 more source

Covert underwater acoustic communications

open access: yesThe Journal of the Acoustical Society of America, 2010
Low probability of detection (LPD) communications are conducted at a low received signal-to-noise ratio (SNR) to deter eavesdroppers to sense the presence of the transmitted signal. Successful detection at intended receiver heavily relies on the processing gain achieved by employing the direct-sequence spread-spectrum (DSSS) technique.
Jun Ling   +4 more
openaire   +2 more sources

Covert communications on renewal packet channels [PDF]

open access: yes2016 54th Annual Allerton Conference on Communication, Control, and Computing (Allerton), 2016
Contains details of an Allerton 2016 submission arXiv:1610 ...
Ramin Soltani   +3 more
openaire   +2 more sources

Covert Bits Through Queues

open access: yes, 2016
We consider covert communication using a queuing timing channel in the presence of a warden. The covert message is encoded using the inter-arrival times of the packets, and the legitimate receiver and the warden observe the inter-departure times of the ...
Mukherjee, Pritam, Ulukus, Sennur
core   +1 more source

Evaluating the Utility of Paired Tumor and Germline Targeted DNA Sequencing for Pediatric Oncology Patients: A Single Institution Report

open access: yesPediatric Blood &Cancer, EarlyView.
ABSTRACT Objective To evaluate the diagnostic yield and utility of universal paired tumor–normal multigene panel sequencing in newly diagnosed pediatric solid and central nervous system (CNS) tumor patients and to compare the detection of germline pathogenic/likely pathogenic variants (PV/LPVs) against established clinical referral criteria for cancer ...
Natalie Waligorski   +9 more
wiley   +1 more source

Home - About - Disclaimer - Privacy