Results 21 to 30 of about 154,545 (256)

Covert underwater acoustic communications

open access: yesThe Journal of the Acoustical Society of America, 2010
Low probability of detection (LPD) communications are conducted at a low received signal-to-noise ratio (SNR) to deter eavesdroppers to sense the presence of the transmitted signal. Successful detection at intended receiver heavily relies on the processing gain achieved by employing the direct-sequence spread-spectrum (DSSS) technique.
Jun Ling   +4 more
openaire   +2 more sources

Covert Channel Pada Aliran Data Websocket untuk Komunikasi Messaging XMPP

open access: yesIJCCS (Indonesian Journal of Computing and Cybernetics Systems), 2015
Abstrak Layanan komunikasi Instant Messaging menyediakan berbagai fitur komunikasi yang bisa digunakan oleh pengguna, diantaranya adalah text messaging (pesan teks) baik online maupun offline.
Yoga Dwitya Pramudita, Reza Pulungan
doaj   +1 more source

Review on unmanned aerial vehicle covert communication network

open access: yesDianxin kexue, 2023
Unmanned aerial vehicle (UAV) communication network is an important part of the future integrated space-aerial-ground network, and an effective support to achieve the global three-dimensional coverage of the communication network.The open characteristics
Hengzhi BAI   +3 more
doaj   +2 more sources

Performance analysis of covert wireless communication based on beam forming with noise uncertainty

open access: yesTongxin xuebao, 2020
In order to establish covert wireless communication in Rayleigh fading environment with noise uncertainty,a scheme of downlink covert wireless communication based on complex Gaussian random coding and beam forming was adopted,and more importantly,the ...
Yuda LIN   +3 more
doaj   +2 more sources

Associations of spousal communication with contraceptive method use among adolescent wives and their husbands in Niger.

open access: yesPLoS ONE, 2020
OBJECTIVES:This study aims to examine associations between spousal communication about contraception and ever use of modern contraception, overt modern contraceptive use (with husband's knowledge), and covert modern contraceptive use (without husband's ...
Sneha Challa   +6 more
doaj   +1 more source

Covert Wireless Communication with a Poisson Field of Interferers [PDF]

open access: yes, 2018
In this paper, we study covert communication in wireless networks consisting of a transmitter, Alice, an intended receiver, Bob, a warden, Willie, and a Poisson field of interferers.
He, Biao   +3 more
core   +5 more sources

Disguised Full-Duplex Covert Communications

open access: yesSensors, 2023
Covert communications have arisen as an effective communications security measure that overcomes some of the limitations of cryptography and physical layer security. The main objective is to completely conceal from external devices the very existence of the link for exchanging confidential messages.
openaire   +3 more sources

Beamforming Design and Covert Performance Analysis for Full-Duplex Multiantenna System

open access: yesComplexity, 2021
In this work, a wireless covert communication system with full-duplex (FD) multiantenna receiver is considered. In order to improve the convert performance of the wireless communication system in the FD mode, a scheme based on selection combining/zero ...
Ling Yang   +5 more
doaj   +1 more source

Analysis of Multiple Antenna Covert Communication Technology Assisted by Artificial Noise [PDF]

open access: yesJisuanji kexue yu tansuo, 2022
A multiple antenna covert communication system is considered, which consists of a multi-antenna transmitter, a two-antenna legitimate user and a single-antenna eavesdropping user with power detection function.
GUO Hui, QIAO Ting
doaj   +1 more source

Selective Noise Based Power-Efficient and Effective Countermeasure against Thermal Covert Channel Attacks in Multi-Core Systems

open access: yesJournal of Low Power Electronics and Applications, 2022
With increasing interest in multi-core systems, such as any communication systems, infra-structures can become targets for information leakages via covert channel communication. Covert channel attacks lead to leaking secret information and data.
Parisa Rahimi   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy