Results 31 to 40 of about 84,456 (273)

Implementation of hybrid artificial intelligence technique to detect covert channels in new generation network protocol IPv6 [PDF]

open access: yes, 2016
Intrusion detection systems offer monolithic way to detect attacks through monitoring, searching for abnormal characteristics and malicious behavior in network communications.
Ma, X, Peytchev, E, Salih, A
core   +1 more source

STAR-RIS Aided Covert Communications

open access: yesGLOBECOM 2023 - 2023 IEEE Global Communications Conference, 2023
This paper investigates the multi-antenna covert communications assisted by a simultaneously transmitting and reflecting reconfigurable intelligent surface (STAR-RIS). In particular, to shelter the existence of communications between transmitter and receiver from a warden, a friendly full-duplex receiver with two antennas is leveraged to make ...
Han Xiao   +6 more
openaire   +2 more sources

Acoustic projectors make covert bioacoustic chirplet signals discoverable

open access: yesScientific Reports, 2023
To disguise man-made communications as natural signals, underwater transceivers have the option to pre-record animal vocalizations, and play them back in a way that carries meaningful information for a trained receiver.
Paolo Casari   +4 more
doaj   +1 more source

Inaudible sound covert channel with anti-jamming capability: Attacks vs. countermeasure

open access: yesJournal of Electronic Science and Technology, 2022
When an inaudible sound covert channel (ISCC) attack is launched inside a computer system, sensitive data are converted to inaudible sound waves and then transmitted.
Xiao-Hang Wang   +7 more
doaj   +1 more source

Covert Wireless Communication with a Poisson Field of Interferers [PDF]

open access: yes, 2018
In this paper, we study covert communication in wireless networks consisting of a transmitter, Alice, an intended receiver, Bob, a warden, Willie, and a Poisson field of interferers.
He, Biao   +3 more
core   +5 more sources

Delay Normalization Technique to Disrupt Covert Timing Channels Using Active Warden [PDF]

open access: yesEPJ Web of Conferences
Covert channels exploit existing network resources, such as packet headers and timing information, to transfer information in ways not originally intended for communication, making them undetectable by conventional methods.
Uttarwar Vrushali Uday   +1 more
doaj   +1 more source

Covert Channel Detection: Machine Learning Approaches

open access: yesIEEE Access, 2022
The advanced development of computer networks and communication technologies has made covert communications easier to construct, faster, undetectable and more secure than ever.
Muawia A. Elsadig, Ahmed Gafar
doaj   +1 more source

Covert Channel Pada Aliran Data Websocket untuk Komunikasi Messaging XMPP

open access: yesIJCCS (Indonesian Journal of Computing and Cybernetics Systems), 2015
Abstrak Layanan komunikasi Instant Messaging menyediakan berbagai fitur komunikasi yang bisa digunakan oleh pengguna, diantaranya adalah text messaging (pesan teks) baik online maupun offline.
Yoga Dwitya Pramudita, Reza Pulungan
doaj   +1 more source

Covert Communication in Fading Channels under Channel Uncertainty [PDF]

open access: yes, 2017
A covert communication system under block fading channels is considered where users experience uncertainty about their channel knowledge. The transmitter seeks to hide the covert communication to a private user by exploiting a legitimate public ...
Shahzad, Khurram   +2 more
core   +2 more sources

Covert communications on Poisson packet channels [PDF]

open access: yes2015 53rd Annual Allerton Conference on Communication, Control, and Computing (Allerton), 2015
Allerton 2015 submission, minor edits ...
Ramin Soltani   +3 more
openaire   +2 more sources

Home - About - Disclaimer - Privacy