Results 51 to 60 of about 84,456 (273)
Performance Analysis for UAV-Jammer Aided Covert Communication
This paper investigates the performance analysis for a novel covert communication system, where a friendly UAV-jammer is used to protect the covert transmission from Alice to Bob against the eavesdropping from Dave.
Wei Liang +3 more
doaj +1 more source
Behavioral Mimicry Covert Communication [PDF]
In this paper, the use of structural behavior of communication protocols (e.g., CSMA) in designing new covert channels is investigated. In this way, the covert transmitter adopts the communication protocol architecture to control its overt traffic flow yet with different parameters that give it enough freedom to embed the covert message in its overt ...
Seyed Ali Ahmadzadeh, Gordon B. Agnew
openaire +1 more source
This work develops 3D‐printable tribopolymer networks that can enhance triboelectric performance under high humidity environments. Polar hydrophilic functional groups and incorporation of zwitterionic monomers promote bound‐water–dominated interfacial polarization thereby increasing electrical outputs.
Linguangze Zhuo +8 more
wiley +1 more source
Adversarial Attack for Deep Steganography Based on Surrogate Training and Knowledge Diffusion
Deep steganography (DS), using neural networks to hide one image in another, has performed well in terms of invisibility, embedding capacity, etc. Current steganalysis methods for DS can only detect or remove secret images hidden in natural images and ...
Fangjian Tao +5 more
doaj +1 more source
Cyclic Olefin Copolymers as Versatile Materials for Advanced Engineering Applications
Cyclic olefin copolymers (COCs) are presented as highly versatile materials combining tunable synthesis, excellent optical properties, and mechanical robustness. Their potential spans microfluidics, bioengineering, and advanced electronics, while emerging self‐healing and sustainable solutions highlight future opportunities.
Giulia Fredi +3 more
wiley +1 more source
In secure communications, the primary focus is on safeguarding the content of the message. In contrast, low probability of intercept (LPI) communications prioritize the privacy of the communication process itself.
Ivan B. Djordjevic, Ignacio A. Rojas
doaj +1 more source
Covert channel detection using Information Theory
This paper presents an information theory based detection framework for covert channels. We first show that the usual notion of interference does not characterize the notion of deliberate information flow of covert channels.
Hélouët, Loïc, Roumy, Aline
core +3 more sources
Covert Communication in the Presence of an Uninformed Jammer [PDF]
14 pages, 4 ...
Tamara V. Sobers +4 more
openaire +2 more sources
Neural cell–derived small extracellular vesicles (sEVs) are emerging as pivotal mediators in neurodegenerative diseases, exerting both pathogenic and therapeutic functions. This review synthesizes current evidence on how sEVs from distinct neural cell types regulate neurodegeneration, neuroprotection, biomarker discovery, and targeted drug delivery ...
Muhammad Waqas Salim +4 more
wiley +1 more source
Cloud environments enable scalable multi-tenant computing but introduce security risks like covert channels, making their detection and classification essential for maintaining cloud security.
Gavini Sreelatha +5 more
doaj +1 more source

