Results 41 to 50 of about 84,456 (273)
SecMon: End-to-End Quality and Security Monitoring System [PDF]
The Voice over Internet Protocol (VoIP) is becoming a more available and popular way of communicating for Internet users. This also applies to Peer-to-Peer (P2P) systems and merging these two have already proven to be successful (e.g. Skype).
Ciszkowski, Tomasz +5 more
core +4 more sources
Covert Channels in the MQTT-Based Internet of Things
Network covert channels are a part of the information hiding research area that deals with the secret transfer of information over communication networks. Covert channels can be utilized, for instance, for data leakage and stealthy malware communications.
Aleksandar Velinov +3 more
doaj +1 more source
Covert underwater acoustic communications
Low probability of detection (LPD) communications are conducted at a low received signal-to-noise ratio (SNR) to deter eavesdroppers to sense the presence of the transmitted signal. Successful detection at intended receiver heavily relies on the processing gain achieved by employing the direct-sequence spread-spectrum (DSSS) technique.
Jun Ling +4 more
openaire +2 more sources
Covert communications on renewal packet channels [PDF]
Contains details of an Allerton 2016 submission arXiv:1610 ...
Ramin Soltani +3 more
openaire +2 more sources
The intelligent terminals deployed in hydropower IoT can quickly sense the status of hydropower equipment, thus improving the efficiency of system control and operation.
Zhenchun Le +6 more
doaj +1 more source
Using Transcoding for Hidden Communication in IP Telephony [PDF]
The paper presents a new steganographic method for IP telephony called TranSteg (Transcoding Steganography). Typically, in steganographic communication it is advised for covert data to be compressed in order to limit its size. In TranSteg it is the overt
Mazurczyk, Wojciech +2 more
core +2 more sources
Hidden and Uncontrolled - On the Emergence of Network Steganographic Threats
Network steganography is the art of hiding secret information within innocent network transmissions. Recent findings indicate that novel malware is increasingly using network steganography.
Caviglione, Luca +3 more
core +1 more source
Objective A patient‐centered approach for chronic disease management, including systemic lupus erythematosus (SLE), aligns treatment with patients’ values and preferences, leading to improved outcomes. This paper summarizes how patient experiences, perspectives, and priorities informed the American College of Rheumatology (ACR) 2024 Lupus Nephritis (LN)
Shivani Garg +20 more
wiley +1 more source
Dispensing Volumetric Additive Manufacturing
Dispensing volumetric additive manufacturing (DVAM) prints 3D structures inside a photocurable resin droplet suspended from the tip of a glass pipette, enabling sequential printing without resin vats or manual part removal. Real‐time droplet profiling and ray‐tracing‐based correction compensate for optical distortion at the curved resin‐air interface ...
Hongryung Jeon +5 more
wiley +1 more source
Ai/ml based detection and categorization of covert communication in IPv6 network
The flexibility and complexity of IPv6 extension headers allow attackers to create covert channels or bypass security mechanisms, leading to potential data breaches or system compromises.
Mohammad Wali Ur Rahman +8 more
doaj +1 more source

