Results 101 to 110 of about 392,009 (311)
Hidden and Uncontrolled - On the Emergence of Network Steganographic Threats
Network steganography is the art of hiding secret information within innocent network transmissions. Recent findings indicate that novel malware is increasingly using network steganography.
Caviglione, Luca +3 more
core +1 more source
Hiding opinions by minimizing disclosed information: an obfuscation-based opinion dynamics model [PDF]
Tanzhe Tang +2 more
openalex +1 more source
Two‐photon lithography (TPL) enables 3D magnetic nanostructures with unmatched freedom in geometry and material choice. Advances in voxel control, deposition, and functionalization open pathways to artificial spin ices, racetracks, microrobots, and a number of additional technological applications.
Joseph Askey +5 more
wiley +1 more source
Coverless Information Hiding Method Based on Web Text
Coverless information hiding has become a hot topic because it can hide secret information (SI) into carriers without any modification. Aiming at the problems of the low hiding capacity (HC) and mismatch in text big data, a novel method of coverless ...
Yi Long +4 more
doaj +1 more source
Steganographically Encoded Data [PDF]
Steganography is the art of hiding information in ways that prevent its detection. Though steganography is an ancient craft, the onset of computer technology has given it new life.
Adrian VASILESCU
core
Molecular engineering of a nonconjugated radical polymer enables a significant enhancement of the glass transition temperature. The amorphous nature and tunability of the polymer, arising from its nonconjugated backbone, facilitates the fabrication of organic memristive devices with an exceptionally high yield (>95%), as well as substantial ...
Daeun Kim +14 more
wiley +1 more source
Steganography in IoT: Information Hiding with Joystick and Touch Sensors. [PDF]
Koptyra K, Ogiela MR.
europepmc +1 more source
Application of Steganography for Anonymity through the Internet [PDF]
In this paper, a novel steganographic scheme based on chaotic iterations is proposed. This research work takes place into the information hiding security framework. The applications for anonymity and privacy through the Internet are regarded too.
Bahi, Jacques M. +3 more
core +1 more source
The highly anisotropic Fermi surface of bismuth results in variations in magnetotransport properties across different crystallographic directions, which can be characterized by studying microcrystals. To avoid the observed surface melting under room temperature Focused Ion Beam (FIB) irradiation, two low‐temperature FIB fabrication methods are proposed
Amaia Sáenz‐Hernández +6 more
wiley +1 more source
Integrated Association Rules Complete Hiding Algorithms
This paper presents database security approach for complete hiding of sensitive association rules by using six novel algorithms. These algorithms utilize three new weights to reduce the needed database modifications and support complete hiding, as well ...
Mohamed Refaat Abdellah +3 more
doaj +1 more source

