Results 61 to 70 of about 163,707 (282)
Covert communication performance evaluation in UAV-assisted rate-splitting multiple access systems. [PDF]
In this paper, we investigate using rate-splitting multiple access (RSMA) to facilitate covert communication in a multi-user unmanned aerial vehicle (UAV) downlink communication network that is being monitored by a warden (Willie). We establish a comprehensive analytical framework and derive closed-form expressions for key performance metrics under ...
Nhu NH +4 more
europepmc +3 more sources
ABSTRACT Purpose Pediatric central nervous system (CNS) tumors often recur despite multimodality therapy. Although re‐irradiation (re‐RT) has historically been limited by concerns for severe late toxicities, modern techniques have renewed interest in this approach. Proton therapy provides dosimetric advantages that may enable curative re‐treatment with
Jin‐Ho Song +15 more
wiley +1 more source
Covert communication for cooperative NOMA with two phases detection
This paper investigates the covert communication of cooperative non-orthogonal multiple access (NOMA) systems, where the near user serves as a decode-and-forward (DF) relay and the far user receives the covert information from both the source and the ...
Hongxing Peng +6 more
doaj +1 more source
ABSTRACT Background Blinatumomab is a bispecific T‐cell engager approved for the treatment of pediatric B‐cell acute lymphoblastic leukemia (B‐ALL). Outpatient home infusion reduces hospitalization burden and optimizes resource utilization, but is logistically challenging.
Angela Parra del Riego +10 more
wiley +1 more source
Performance Analysis for UAV-Jammer Aided Covert Communication
This paper investigates the performance analysis for a novel covert communication system, where a friendly UAV-jammer is used to protect the covert transmission from Alice to Bob against the eavesdropping from Dave.
Wei Liang +3 more
doaj +1 more source
Hidden and Uncontrolled - On the Emergence of Network Steganographic Threats
Network steganography is the art of hiding secret information within innocent network transmissions. Recent findings indicate that novel malware is increasingly using network steganography.
Caviglione, Luca +3 more
core +1 more source
ABSTRACT Background Sickle cell disease (SCD) is a chronic, inherited hemoglobinopathy that requires frequent hospitalization for disease‐related complications. Canadian data on inpatient care is limited. This study compared caregiver‐reported hospital experiences of children with SCD to those with cystic fibrosis (CF), a chronic, autosomal recessive ...
Hailey M. Zwicker +11 more
wiley +1 more source
Towards Provably Invisible Network Flow Fingerprints
Network traffic analysis reveals important information even when messages are encrypted. We consider active traffic analysis via flow fingerprinting by invisibly embedding information into packet timings of flows.
Goeckel, Dennis +3 more
core +1 more source
ABSTRACT Background This study investigated how neighborhood‐level social determinants of health (SDOH), including redlining and neurological risk, interact to influence cognitive outcomes in children treated for brain tumors (CTBT). Methods A retrospective chart review of 161 CTBT aged 5–17 was conducted.
Alannah R. Srsich +5 more
wiley +1 more source
Simulation analysis of probabilistic covert channels based on probabilistic interference
Bandwidth and transmission error rate has received much attention in fields of covert channels.If a system does not satisfy BSPNI,PBNDC or SPBNDC property,then probabilistic covert channels will be formed.A simulation system was built to analyze their ...
GUO Yun-chuan1 +3 more
doaj +2 more sources

