Results 241 to 250 of about 154,545 (256)
Some of the next articles are maybe not open access.

Detecting covert communication on Android

37th Annual IEEE Conference on Local Computer Networks, 2012
Using covert channels, malicious applications on Android-based smartphones are able to subvert the permission system and share data in a potentially untraceable manner. These channels are easy to exploit today, and have enough bandwidth to transmit sensitive information in real-time between collaborating applications.
Michael Hansen   +2 more
openaire   +1 more source

Jamming Strategies in Covert Communication

2019
Consider the communication problem where Alice tries to send a message towards Bob while trying to conceal the presence of communication from a watchful adversary, Willie, which tries to determine if a transmission took place or not. Under the basic settings, where all variables are known to Willie, the total amount of information bits that can be ...
Ori Shmuel, Asaf Cohen, Omer Gurewitz
openaire   +1 more source

Covert computer and network communications

Proceedings of the 4th annual conference on Information security curriculum development, 2007
The ex-filtration of confidential information across communication networks is a challenging problem. It is possible for transmissions to be hidden or masked in such a way to circumvent the security policies of an organization. An objective might be to make contacts "invisible" to all parties except designates.
openaire   +1 more source

Physical Layer Covert Communications

2023
Yulong Shen   +2 more
openaire   +1 more source

Covert Communications: A Comprehensive Survey

IEEE Communications Surveys & Tutorials, 2023
Xinying Chen   +6 more
openaire   +2 more sources

Intelligent covert communication

China Communications
Zan, Li   +5 more
openaire   +1 more source

Home - About - Disclaimer - Privacy