Results 41 to 50 of about 4,330 (158)

Risk-driven behaviour in the African leopard:how is leopard behaviour mediated by lion presence? [PDF]

open access: yes, 2016
Agricultural expansion is restricting many carnivore species to smaller tracts of land, potentially forcing increased levels of overlap between competitors by constraining spatial partitioning.
RAFIQ, KASIM
core  

Distributed Relay Protocol for Probabilistic Information-Theoretic Security in a Randomly-Compromised Network

open access: yes, 2008
We introduce a simple, practical approach with probabilistic information-theoretic security to mitigate one of quantum key distribution's major limitations: the short maximum transmission distance (~200 km) possible with present day technology.
A. Herzberg   +9 more
core   +2 more sources

Whispers in End Hopping: High-Robustness Network Covert Channel Based on End Spreading

open access: yesInformation
The massive use of end information in the end hopping system not only significantly improves the proactive defense capability but also reveals great potential for covert communication.
Zhengwen Wang, Fangxiao Li, Leyi Shi
doaj   +1 more source

Techniques for the dynamic randomization of network attributes [PDF]

open access: yes, 2016
Critical infrastructure control systems continue to foster predictable communication paths and static configurations that allow easy access to our networked critical infrastructure around the world.
Chavez, AR, Peisert, S, Stout, WMS
core  

Survey and Systematization of Secure Device Pairing

open access: yes, 2017
Secure Device Pairing (SDP) schemes have been developed to facilitate secure communications among smart devices, both personal mobile devices and Internet of Things (IoT) devices.
Fomichev, Mikhail   +4 more
core   +1 more source

Enhancing Data Security in Satellite Communication Systems: Integrating Quantum Cryptography with CatBoost Machine Learning

open access: yesInformation
In modern communication networks, particularly satellite-based systems, data security faces significant challenges from vulnerabilities such as signal interception, jamming, and latency during long distance transmissions.
Mohd Nadeem   +4 more
doaj   +1 more source

Cyber Attacks on Space Information Networks: Vulnerabilities, Threats, and Countermeasures for Satellite Security

open access: yesJournal of Cybersecurity and Privacy
The growing reliance on satellite-based infrastructures for communication, navigation, defense, and environmental monitoring has magnified the urgency of securing Space Information Networks (SINs) against cyber threats.
Afsana Sharmin   +4 more
doaj   +1 more source

A Review of the Energy Efficient and Secure Multicast Routing Protocols for Mobile Ad hoc Networks

open access: yes, 2010
This paper presents a thorough survey of recent work addressing energy efficient multicast routing protocols and secure multicast routing protocols in Mobile Ad hoc Networks (MANETs).
Meghanathan, Natarajan   +1 more
core   +2 more sources

A proactive defense method against eavesdropping attack in SDN-based storage environment

open access: yesCybersecurity
The integration of Software-Defined Networking (SDN) in storage centers aims to enhance storage performance. However, this integration also introduces new concerns, particularly the potential eavesdropping attacks that pose a substantial risk to data ...
Yuming Liu, Yong Wang, Hao Feng
doaj   +1 more source

Practical cryptographic strategies in the post-quantum era

open access: yes, 2018
We review new frontiers in information security technologies in communications and distributed storage technologies with the use of classical, quantum, hybrid classical-quantum, and post-quantum cryptography.
Fedorov, A. K.   +3 more
core   +1 more source

Home - About - Disclaimer - Privacy