Results 241 to 250 of about 83,946 (258)
Some of the next articles are maybe not open access.
Towards Adaptive Covert Communication System
2008 14th IEEE Pacific Rim International Symposium on Dependable Computing, 2008Covert channels are secret communication paths, which existance is not expected in the original system design. Covert channels can be used as legimate tools of censorship resistance, anonimity and privacy preservation to address issues with "national" firewalls, citizen profiling and other "unethical" uses of information technology.
Fedor V. Yarochkin +4 more
openaire +1 more source
Exact Throughput-Covertness Relation for Covert Communications
GLOBECOM 2022 - 2022 IEEE Global Communications Conference, 2022Daizhong Yu +3 more
openaire +1 more source
Detecting covert communication on Android
37th Annual IEEE Conference on Local Computer Networks, 2012Using covert channels, malicious applications on Android-based smartphones are able to subvert the permission system and share data in a potentially untraceable manner. These channels are easy to exploit today, and have enough bandwidth to transmit sensitive information in real-time between collaborating applications.
Michael Hansen +2 more
openaire +1 more source
Jamming Strategies in Covert Communication
2019Consider the communication problem where Alice tries to send a message towards Bob while trying to conceal the presence of communication from a watchful adversary, Willie, which tries to determine if a transmission took place or not. Under the basic settings, where all variables are known to Willie, the total amount of information bits that can be ...
Ori Shmuel, Asaf Cohen, Omer Gurewitz
openaire +1 more source
Covert computer and network communications
Proceedings of the 4th annual conference on Information security curriculum development, 2007The ex-filtration of confidential information across communication networks is a challenging problem. It is possible for transmissions to be hidden or masked in such a way to circumvent the security policies of an organization. An objective might be to make contacts "invisible" to all parties except designates.
openaire +1 more source
Covert Communications: A Comprehensive Survey
IEEE Communications Surveys & Tutorials, 2023Xinying Chen +6 more
openaire +2 more sources

