Results 41 to 50 of about 84,456 (273)

SecMon: End-to-End Quality and Security Monitoring System [PDF]

open access: yes, 2008
The Voice over Internet Protocol (VoIP) is becoming a more available and popular way of communicating for Internet users. This also applies to Peer-to-Peer (P2P) systems and merging these two have already proven to be successful (e.g. Skype).
Ciszkowski, Tomasz   +5 more
core   +4 more sources

Covert Channels in the MQTT-Based Internet of Things

open access: yesIEEE Access, 2019
Network covert channels are a part of the information hiding research area that deals with the secret transfer of information over communication networks. Covert channels can be utilized, for instance, for data leakage and stealthy malware communications.
Aleksandar Velinov   +3 more
doaj   +1 more source

Covert underwater acoustic communications

open access: yesThe Journal of the Acoustical Society of America, 2010
Low probability of detection (LPD) communications are conducted at a low received signal-to-noise ratio (SNR) to deter eavesdroppers to sense the presence of the transmitted signal. Successful detection at intended receiver heavily relies on the processing gain achieved by employing the direct-sequence spread-spectrum (DSSS) technique.
Jun Ling   +4 more
openaire   +2 more sources

Covert communications on renewal packet channels [PDF]

open access: yes2016 54th Annual Allerton Conference on Communication, Control, and Computing (Allerton), 2016
Contains details of an Allerton 2016 submission arXiv:1610 ...
Ramin Soltani   +3 more
openaire   +2 more sources

On Joint Optimization of UAV-Assisted Covert Communication Systems with NOMA for Hydropower Internet of Things

open access: yesDrones, 2023
The intelligent terminals deployed in hydropower IoT can quickly sense the status of hydropower equipment, thus improving the efficiency of system control and operation.
Zhenchun Le   +6 more
doaj   +1 more source

Using Transcoding for Hidden Communication in IP Telephony [PDF]

open access: yes, 2011
The paper presents a new steganographic method for IP telephony called TranSteg (Transcoding Steganography). Typically, in steganographic communication it is advised for covert data to be compressed in order to limit its size. In TranSteg it is the overt
Mazurczyk, Wojciech   +2 more
core   +2 more sources

Hidden and Uncontrolled - On the Emergence of Network Steganographic Threats

open access: yes, 2014
Network steganography is the art of hiding secret information within innocent network transmissions. Recent findings indicate that novel malware is increasingly using network steganography.
Caviglione, Luca   +3 more
core   +1 more source

A Qualitative Analysis of Patient Perspectives and Preferences in Lupus Management to Guide Lupus Guidelines Development

open access: yesArthritis Care &Research, EarlyView.
Objective A patient‐centered approach for chronic disease management, including systemic lupus erythematosus (SLE), aligns treatment with patients’ values and preferences, leading to improved outcomes. This paper summarizes how patient experiences, perspectives, and priorities informed the American College of Rheumatology (ACR) 2024 Lupus Nephritis (LN)
Shivani Garg   +20 more
wiley   +1 more source

Dispensing Volumetric Additive Manufacturing

open access: yesAdvanced Functional Materials, EarlyView.
Dispensing volumetric additive manufacturing (DVAM) prints 3D structures inside a photocurable resin droplet suspended from the tip of a glass pipette, enabling sequential printing without resin vats or manual part removal. Real‐time droplet profiling and ray‐tracing‐based correction compensate for optical distortion at the curved resin‐air interface ...
Hongryung Jeon   +5 more
wiley   +1 more source

Ai/ml based detection and categorization of covert communication in IPv6 network

open access: yesCybersecurity
The flexibility and complexity of IPv6 extension headers allow attackers to create covert channels or bypass security mechanisms, leading to potential data breaches or system compromises.
Mohammad Wali Ur Rahman   +8 more
doaj   +1 more source

Home - About - Disclaimer - Privacy