Results 51 to 60 of about 154,545 (256)

Interplay between circadian and other transcription factors—Implications for cycling transcriptome reprogramming

open access: yesFEBS Letters, EarlyView.
This perspective highlights emerging insights into how the circadian transcription factor CLOCK:BMAL1 regulates chromatin architecture, cooperates with other transcription factors, and coordinates enhancer dynamics. We propose an updated framework for how circadian transcription factors operate within dynamic and multifactorial chromatin landscapes ...
Xinyu Y. Nie, Jerome S. Menet
wiley   +1 more source

Energy‐efficient covert communication with adaptive assist nodes group

open access: yesIET Communications, 2023
In this paper, a joint detection strategy of Willie based on two phases observation is proposed and an energy‐efficient covert communication scheme with an adaptive assist nodes group (AANG) based on uniform jamming power (UJP) strategy is proposed to ...
Zehan Wan   +4 more
doaj   +1 more source

Optimal Covert Communication Technology

open access: yes, 2022
Due to advancement in hacking/reverse engineering tools, threat against transfer of sensitive data or highly classified information is always at risk of being intercepted by an attacker. Covert communication outwit this malicious breach of privacy act better than cryptography as it camouflage secret information inside another innocent looking ...
openaire   +2 more sources

Behavioral Mimicry Covert Communication [PDF]

open access: yes, 2012
In this paper, the use of structural behavior of communication protocols (e.g., CSMA) in designing new covert channels is investigated. In this way, the covert transmitter adopts the communication protocol architecture to control its overt traffic flow yet with different parameters that give it enough freedom to embed the covert message in its overt ...
Seyed Ali Ahmadzadeh, Gordon Agnew
openaire   +1 more source

Disordered but rhythmic—the role of intrinsic protein disorder in eukaryotic circadian timing

open access: yesFEBS Letters, EarlyView.
Unstructured domains known as intrinsically disordered regions (IDRs) are present in nearly every part of the eukaryotic core circadian oscillator. IDRs enable many diverse inter‐ and intramolecular interactions that support clock function. IDR conformations are highly tunable by post‐translational modifications and environmental conditions, which ...
Emery T. Usher, Jacqueline F. Pelham
wiley   +1 more source

Covert Channels in the MQTT-Based Internet of Things

open access: yesIEEE Access, 2019
Network covert channels are a part of the information hiding research area that deals with the secret transfer of information over communication networks. Covert channels can be utilized, for instance, for data leakage and stealthy malware communications.
Aleksandar Velinov   +3 more
doaj   +1 more source

BitWhisper: Covert Signaling Channel between Air-Gapped Computers using Thermal Manipulations

open access: yes, 2015
It has been assumed that the physical separation (air-gap) of computers provides a reliable level of security, such that should two adjacent computers become compromised, the covert exchange of data between them would be impossible.
Elovici, Yuval   +3 more
core   +1 more source

Mechanisms of parasite‐mediated disruption of brain vessels

open access: yesFEBS Letters, EarlyView.
Parasites can affect the blood vessels of the brain, often causing serious neurological problems. This review explains how different parasites interact with and disrupt these vessels, what this means for brain health, and why these processes matter. Understanding these mechanisms may help us develop better ways to prevent or treat brain infections in ...
Leonor Loira   +3 more
wiley   +1 more source

Geolocation of covert communication entity on the Internet for post-steganalysis

open access: yesEURASIP Journal on Image and Video Processing, 2020
Geolocation of covert communication entity is significantly important for the forensics of the crime but has significant challenges when the steganalyst locks the guilty actor IP and wants to know the physical location of the actor.
Fan Zhang, Fenlin Liu, Xiangyang Luo
doaj   +1 more source

Covert communications through network configuration messages

open access: yesComputers & Security, 2013
Covert channels are a form of hidden communication that may violate the integrity of systems. Since their birth in Multi-Level Security systems in the early 70's they have evolved considerably, such that new solutions have appeared for computer networks mainly due to vague protocols specifications.
Ríos-del-Pozo, Rubén   +2 more
openaire   +2 more sources

Home - About - Disclaimer - Privacy