Results 61 to 70 of about 84,456 (273)

xLED: Covert Data Exfiltration from Air-Gapped Networks via Router LEDs

open access: yes, 2017
In this paper we show how attackers can covertly leak data (e.g., encryption keys, passwords and files) from highly secure or air-gapped networks via the row of status LEDs that exists in networking equipment such as LAN switches and routers. Although it
Daidakulov, Andrey   +3 more
core   +1 more source

Study on Airspace Covert Communication Algorithm of Covert Communication System

open access: yesJournal of Networks, 2012
Based on the security of information transmission through network in the information society, the paper puts forward covert communication technology which is more reliable than the prior encryption algorithm, analyzes channel covertness and information hiding of covert communication technology based on spread-spectrum communication technology, and ...
openaire   +1 more source

Covert Communication in Autoencoder Wireless Systems

open access: yesCoRR, 2023
Hiding the wireless communication by transmitter Alice to intended receiver Bob from a capable and attentive adversary Willie has been widely studied under the moniker "covert communications". However, when such covert communication is done in the presence of allowable system communications, there has been little study of both hiding the signal and ...
Ali Mohammadi Teshnizi   +2 more
openaire   +2 more sources

Nanotherapies for Atherosclerosis: Targeting, Catalysis, and Energy Transduction

open access: yesAdvanced Healthcare Materials, EarlyView.
Atherosclerosis management is hindered by poor drug targeting and plaque heterogeneity. Nanotechnology overcomes these barriers via three core strategies: (1) target‐engineered nanocarriers that achieve lesion‐specific precision via ligand modification, biomimetic camouflage, stimuli‐responsive release, and self‐propelling nanomotors; (2) catalytic ...
Yuqi Yang   +4 more
wiley   +1 more source

Covert Multi-Access Communication with a Non-Covert User

open access: yesICC 2024 - IEEE International Conference on Communications
In this paper, we characterize the fundamental limits of a communication system with three users (i.e., three transmitters) and a single receiver where communication from two covert users must remain undetectable to an external warden. Our results show a tradeoff between the highest rates that are simultaneously achievable for the three users.
Abdelaziz Bounhar   +2 more
openaire   +2 more sources

Opportunities of Semiconducting Oxide Nanostructures as Advanced Luminescent Materials in Photonics

open access: yesAdvanced Materials, EarlyView.
The review discusses the challenges of wide and ultrawide bandgap semiconducting oxides as a suitable material platform for photonics. They offer great versatility in terms of tuning microstructure, native defects, doping, anisotropy, and micro‐ and nano‐structuring. The review focuses on their light emission, light‐confinement in optical cavities, and
Ana Cremades   +7 more
wiley   +1 more source

Reassessing the Citizens Protection Act: A Good Thing It Passed, and a Good Thing It Failed [PDF]

open access: yes, 2013
The Citizens Protection Act (CPA) of 1998 has always been a lightening rod for criticism, and it remains so today. This article reassesses the CPA’s perceived inadequacies in light of how it has actually affected (or, not affected) federal prosecutors ...
Sirota, Rima
core   +1 more source

Covert Capacity of Non-Coherent Rayleigh-Fading Channels

open access: yes, 2019
The covert capacity is characterized for a non-coherent fast Rayleigh-fading wireless channel, in which a legitimate user wishes to communicate reliably with a legitimate receiver while escaping detection from a warden.
Bloch, Matthieu R.   +2 more
core   +3 more sources

Covert Communication Networks in Hostile Environments [PDF]

open access: yesSecurity and Communication Networks, 2018
International ...
Kiseon Kim   +2 more
openaire   +2 more sources

Light‐Induced Entropy for Secure Vision

open access: yesAdvanced Materials, EarlyView.
This work realized a ternary true random number generator by exploiting stochastic traps emerging within multiple junction interfaces, and quantitatively validated the generation of high‐quality random numbers. Furthermore, it successfully demonstrated diverse applications, including AI‐resilient image security, thereby providing a valuable guide for ...
Juhyung Seo   +9 more
wiley   +1 more source

Home - About - Disclaimer - Privacy