Results 51 to 60 of about 83,946 (258)
Hidden and Uncontrolled - On the Emergence of Network Steganographic Threats
Network steganography is the art of hiding secret information within innocent network transmissions. Recent findings indicate that novel malware is increasingly using network steganography.
Caviglione, Luca +3 more
core +1 more source
Novel ferrocene derivatives (e.g., FcPhc2) are used as an ultrathin layer hole‐blocking layer, reducing hole injection from the Ag contact. This results in an ultralow noise spectral density of 1.2 × 10−14 A Hz−1/2, and a high specific detectivity of 8.1 × 1012 Jones at −0.5 V.
Eunyoung Hong +16 more
wiley +1 more source
In secure communications, the primary focus is on safeguarding the content of the message. In contrast, low probability of intercept (LPI) communications prioritize the privacy of the communication process itself.
Ivan B. Djordjevic, Ignacio A. Rojas
doaj +1 more source
Biofabrication aims at providing innovative technologies and tools for the fabrication of tissue‐like constructs for tissue engineering and regenerative medicine applications. By integrating multiple biofabrication technologies, such as 3D (bio) printing with fiber fabrication methods, it would be more realistic to reconstruct native tissue's ...
Waseem Kitana +2 more
wiley +1 more source
Cloud environments enable scalable multi-tenant computing but introduce security risks like covert channels, making their detection and classification essential for maintaining cloud security.
Gavini Sreelatha +5 more
doaj +1 more source
Covert channel detection using Information Theory
This paper presents an information theory based detection framework for covert channels. We first show that the usual notion of interference does not characterize the notion of deliberate information flow of covert channels.
Hélouët, Loïc, Roumy, Aline
core +3 more sources
Quantum Emitters in Hexagonal Boron Nitride: Principles, Engineering and Applications
Quantum emitters in hexagonal boron nitride have emerged as a promising candidate for quantum information science. This review examines the fundamentals of these quantum emitters, including their level structures, defect engineering, and their possible chemical structures.
Thi Ngoc Anh Mai +8 more
wiley +1 more source
Optimal Covert Communication Technology
Due to advancement in hacking/reverse engineering tools, threat against transfer of sensitive data or highly classified information is always at risk of being intercepted by an attacker. Covert communication outwit this malicious breach of privacy act better than cryptography as it camouflage secret information inside another innocent looking ...
openaire +2 more sources
Behavioral Mimicry Covert Communication [PDF]
In this paper, the use of structural behavior of communication protocols (e.g., CSMA) in designing new covert channels is investigated. In this way, the covert transmitter adopts the communication protocol architecture to control its overt traffic flow yet with different parameters that give it enough freedom to embed the covert message in its overt ...
Seyed Ali Ahmadzadeh, Gordon Agnew
openaire +1 more source
Synchrotron Radiation for Quantum Technology
Materials and interfaces underpin quantum technologies, with synchrotron and FEL methods key to understanding and optimizing them. Advances span superconducting and semiconducting qubits, 2D materials, and topological systems, where strain, defects, and interfaces govern performance.
Oliver Rader +10 more
wiley +1 more source

