Results 41 to 50 of about 163,707 (282)
Performance Comparison of Relay-Based Covert Communications: DF, CF and AF
In this paper, we investigate the performance of covert communications in different types of a relay system: decode-and-forward (DF), compress-and-forward (CF) and amplify-and-forward (AF).
Jihwan Moon
doaj +1 more source
ABSTRACT Blinatumomab has been shown to be highly effective for patients with pediatric B‐ALL and has recently become standard of care therapy. Due to its past use in the clinical trial setting, there is limited information available about real‐world administration.
Katelyn Oranges +12 more
wiley +1 more source
Induced gamma-band activity is related to the time point of object identification [PDF]
Peer ...
Gruber, Thomas +3 more
core +1 more source
An IEEE 802.11 MAC Layer Covert Channel Based On Supported Rates
Wireless Local Area Networks present several vulnerabilities that are exploited, and as a result, numerous attacks have been developed and used against them. Although countermeasures to detect and eliminate such threats have been created throughout the years, few methods exist to prevent the attacks.
Geovani Teca, Marek Natkaniec
openaire +2 more sources
ABSTRACT Objective To evaluate the diagnostic yield and utility of universal paired tumor–normal multigene panel sequencing in newly diagnosed pediatric solid and central nervous system (CNS) tumor patients and to compare the detection of germline pathogenic/likely pathogenic variants (PV/LPVs) against established clinical referral criteria for cancer ...
Natalie Waligorski +9 more
wiley +1 more source
Joint Altitude and Power Optimization for Multi-UAV-Aided Covert Communication with Relay Selection
Unmanned aerial vehicles (UAVs) are pivotal for 6G ubiquity, yet their open line-of-sight channels increase vulnerability to interception, posing new challenges for covert communication. This paper proposes a joint optimization scheme for multi-UAV relay-
Mengqi Yang, Ying Huang, Jing Lei
doaj +1 more source
Construction of Internet of Vehicles Covert Channel Based on Websocket Protocol [PDF]
Aiming at the problem that the construction method of covert channel under traditional Internet of Vehicles protocol is single and cannot be applied to complex network environment,a construction method of covert channel in Internet of Vehicles based on ...
ZHAO Hui, PENG Jianyou, QIN Yulin, HAN Lili
doaj +1 more source
xLED: Covert Data Exfiltration from Air-Gapped Networks via Router LEDs
In this paper we show how attackers can covertly leak data (e.g., encryption keys, passwords and files) from highly secure or air-gapped networks via the row of status LEDs that exists in networking equipment such as LAN switches and routers. Although it
Daidakulov, Andrey +3 more
core +1 more source
Understanding Public Evaluation: Quantifying Experimenter Intervention [PDF]
Public evaluations are popular because some research questions can only be answered by turning “to the wild.” Different approaches place experimenters in different roles during deployment, which has implications for the kinds of data that can be ...
Williamson, John, Williamson, Julie R.
core +1 more source
Outcomes of Live Virus Vaccination in Patients With Vascular Anomalies Being Treated With Sirolimus
ABSTRACT Background Live vaccination in patients with vascular anomalies (VA) receiving sirolimus remains controversial due to immunosuppressive effects and theoretical risks. Procedure This single‐center retrospective study included patients with VA less than 4 years old at the start of sirolimus therapy who were incompletely vaccinated.
Svatava Merkle +5 more
wiley +1 more source

