Results 61 to 70 of about 83,946 (258)
Mimicking Multiple Whale Whistles-Based Underwater Covert Communication
In underwater biomimetic covert communications, multiple whale whistles are mimicked for improving covertness. The conventional mimicking methods suffered from the trade-off between the mimicking performance and the bit error rate (BER).
Hojun Lee +5 more
doaj +1 more source
A Covert Data Transport Protocol
Both enterprise and national firewalls filter network connections. For data forensics and botnet removal applications, it is important to establish the information source.
Brooks, Richard +4 more
core +1 more source
The SERS spectra of reporter molecules adsorbed on chiral gold nanorods depends on the handedness of circularly polarized light (CPL‐SERS). The bisignate plasmonic CD spectra of chiral nanorods provides wavelength‐dependent CPL‐SERS. Selective discrimination of chiral nanorod handedness and different Raman reporters allow highly sensitive codification ...
Andrés Serrano‐Freijeiro +9 more
wiley +1 more source
Covert Capacity of Non-Coherent Rayleigh-Fading Channels
The covert capacity is characterized for a non-coherent fast Rayleigh-fading wireless channel, in which a legitimate user wishes to communicate reliably with a legitimate receiver while escaping detection from a warden.
Bloch, Matthieu R. +2 more
core +2 more sources
Covert communications through network configuration messages
Covert channels are a form of hidden communication that may violate the integrity of systems. Since their birth in Multi-Level Security systems in the early 70's they have evolved considerably, such that new solutions have appeared for computer networks mainly due to vague protocols specifications.
Ríos-del-Pozo, Rubén +2 more
openaire +2 more sources
Gaussian Signalling for Covert Communications [PDF]
In this work, we examine the optimality of Gaussian signalling for covert communications with an upper bound on $\mathcal{D}(p_{_1}||p_{_0})$ or $\mathcal{D}(p_{_0}||p_{_1})$ as the covertness constraint, where $\mathcal{D}(p_{_1}||p_{_0})$ and $\mathcal{D}(p_{_0}||p_{_1})$ are different due to the asymmetry of Kullback-Leibler divergence, $p_{_0}(y ...
Shihao Yan +3 more
openaire +3 more sources
This study presents the BioCLEAR system, a highly transparent and conductive neural electrode array composed of silver nanowires (AgNWs) and doped PEDOT:PSS, enabling neural recordings with minimal optical artifacts. When integrated with a GRIN lens, this cost‐effective neural implant allows simultaneous electrophysiological recording and GCaMP6‐based ...
Dongjun Han +17 more
wiley +1 more source
Covert communications in a compress-and-forward relay system
In this paper, we study covert communications strategies in a compress-and-forward (CF) relay system. Along with a public message to a destination node via a CF relay, a source node attempts to transmit a covert message while evading the surveillance of ...
Jihwan Moon
doaj +1 more source
Covert Channels in SIP for VoIP signalling
In this paper, we evaluate available steganographic techniques for SIP (Session Initiation Protocol) that can be used for creating covert channels during signaling phase of VoIP (Voice over IP) call.
B. Lampson +3 more
core +1 more source
Electrically Tunable On‐Chip Topological Photonics with Integrated Carbon Nanotubes
This work demonstrates electrically tunable on‐chip topological THz devices by integrating 2D carbon nanotube (CNT) sheets with valley‐Hall photonic crystals, enabling broadband transmission modulation (71% modulation depth) and tunable narrowband filtering (0.54 GHz shift) through electrically induced thermal tuning. This advancement paves the way for
Jifan Yin +7 more
wiley +1 more source

