Results 51 to 60 of about 84,456 (273)

Performance Analysis for UAV-Jammer Aided Covert Communication

open access: yesIEEE Access, 2020
This paper investigates the performance analysis for a novel covert communication system, where a friendly UAV-jammer is used to protect the covert transmission from Alice to Bob against the eavesdropping from Dave.
Wei Liang   +3 more
doaj   +1 more source

Behavioral Mimicry Covert Communication [PDF]

open access: yes, 2012
In this paper, the use of structural behavior of communication protocols (e.g., CSMA) in designing new covert channels is investigated. In this way, the covert transmitter adopts the communication protocol architecture to control its overt traffic flow yet with different parameters that give it enough freedom to embed the covert message in its overt ...
Seyed Ali Ahmadzadeh, Gordon B. Agnew
openaire   +1 more source

3D‐Printed Hygroscopic Polymer Networks for High‐Humidity Triboelectric Nanogenerators to Wirelessly Power Implantable Electronic Devices‐ A Conceptual Pathway

open access: yesAdvanced Functional Materials, EarlyView.
This work develops 3D‐printable tribopolymer networks that can enhance triboelectric performance under high humidity environments. Polar hydrophilic functional groups and incorporation of zwitterionic monomers promote bound‐water–dominated interfacial polarization thereby increasing electrical outputs.
Linguangze Zhuo   +8 more
wiley   +1 more source

Adversarial Attack for Deep Steganography Based on Surrogate Training and Knowledge Diffusion

open access: yesApplied Sciences, 2023
Deep steganography (DS), using neural networks to hide one image in another, has performed well in terms of invisibility, embedding capacity, etc. Current steganalysis methods for DS can only detect or remove secret images hidden in natural images and ...
Fangjian Tao   +5 more
doaj   +1 more source

Cyclic Olefin Copolymers as Versatile Materials for Advanced Engineering Applications

open access: yesAdvanced Functional Materials, EarlyView.
Cyclic olefin copolymers (COCs) are presented as highly versatile materials combining tunable synthesis, excellent optical properties, and mechanical robustness. Their potential spans microfluidics, bioengineering, and advanced electronics, while emerging self‐healing and sustainable solutions highlight future opportunities.
Giulia Fredi   +3 more
wiley   +1 more source

Entanglement Assisted LPI and Covert Communications With SLM-Based Beam Steering Over Turbulent Optical Channels

open access: yesIEEE Access
In secure communications, the primary focus is on safeguarding the content of the message. In contrast, low probability of intercept (LPI) communications prioritize the privacy of the communication process itself.
Ivan B. Djordjevic, Ignacio A. Rojas
doaj   +1 more source

Covert channel detection using Information Theory

open access: yes, 2010
This paper presents an information theory based detection framework for covert channels. We first show that the usual notion of interference does not characterize the notion of deliberate information flow of covert channels.
Hélouët, Loïc, Roumy, Aline
core   +3 more sources

Covert Communication in the Presence of an Uninformed Jammer [PDF]

open access: yesIEEE Transactions on Wireless Communications, 2017
14 pages, 4 ...
Tamara V. Sobers   +4 more
openaire   +2 more sources

Small Extracellular Vesicles from Neural Cells: Physiological and Pathological Roles, and Potential in Neurodegenerative Therapy

open access: yesAdvanced Healthcare Materials, EarlyView.
Neural cell–derived small extracellular vesicles (sEVs) are emerging as pivotal mediators in neurodegenerative diseases, exerting both pathogenic and therapeutic functions. This review synthesizes current evidence on how sEVs from distinct neural cell types regulate neurodegeneration, neuroprotection, biomarker discovery, and targeted drug delivery ...
Muhammad Waqas Salim   +4 more
wiley   +1 more source

Detecting hidden communication threats in cloud systems using advanced pattern and threat propagation analysis

open access: yesJournal of Cloud Computing: Advances, Systems and Applications
Cloud environments enable scalable multi-tenant computing but introduce security risks like covert channels, making their detection and classification essential for maintaining cloud security.
Gavini Sreelatha   +5 more
doaj   +1 more source

Home - About - Disclaimer - Privacy