نتایج جستجو برای: covert index

تعداد نتایج: 400911  

2005
Vincent Berk Annarita Giani George Cybenko

Covert channels are mechanisms for communicating information in ways that are difficult to detect. Data exfiltration can be an indication that a computer has been compromised by an attacker even when other intrusion detection schemes have failed to detect a successful attack. Covert timing channels use packet interarrival times, not header or payload embedded information, to encode covert messa...

2017
K. Kogos A. Sokolov

Covert channels are used for information transmission in a manner that is not intended for communication and is difficult to detect. We propose a technique to prevent the information leakage via IP covert timing channels by inter-packet delays normalization in the process of packets sending. Recommendations for using the counteraction methods and choosing parameters were given. The advantage of...

Journal: :Neurology 2001
J J Barton M Cherkasova M O'Connor

BACKGROUND Some patients with prosopagnosia have covert recognition, meaning that they retain some familiarity or knowledge of facial identity of which they are not aware. OBJECTIVE To test the hypothesis that prosopagnosic patients with right occipitotemporal lesions and impaired face perception lack covert processing, whereas patients with associative prosopagnosia and bilateral anterior te...

2008
Steven Gianvecchio Haining Wang Duminda Wijesekera Sushil Jajodia

The exploration of advanced covert timing channel design is important to understand and defend against covert timing channels. In this paper, we introduce a new class of covert timing channels, called model-based covert timing channels, which exploit the statistical properties of legitimate network traffic to evade detection in an effective manner. We design and implement an automated framework...

Journal: :CoRR 2014
Joshua Davis

A network covert channel is created that operates by modulating the time between web resource accesses, with an “average web user” read-time used as a reference. While the covert channel may be classified as timing based, it does not operate by changing deterministic protocol attributes such as inter-packet delay, as do most timing based network covert channels. Instead, our channel communicate...

2018
Brónagh McCoy Jan Theeuwes

Recent research on the impact of location-based reward on attentional orienting has indicated that reward factors play an influential role in spatial priority maps. The current study investigated whether and how reward associations based on spatial location translate from overt eye movements to covert attention. If reward associations can be tied to locations in space, and if overt and covert a...

Journal: :Journal of applied behavior analysis 1997
I Taylor M F O'Reilly

We developed a methodology, derived from the theoretical literatures on rule-governed behavior and private events, to experimentally investigate the relationship between covert verbal self-regulation and nonverbal behavior. The methodology was designed to assess whether (a) nonverbal behavior was under the control of covert rules and (b) verbal reports of these rules were functionally equivalen...

Journal: :Journal of experimental psychology. Human perception and performance 2012
Artem V Belopolsky Jan Theeuwes

There is an ongoing controversy regarding the relationship between covert attention and saccadic eye movements. While there is quite some evidence that the preparation of a saccade is obligatory preceded by a shift of covert attention, the reverse is not clear: Is allocation of attention always accompanied by saccade preparation? Recently, a shifting and maintenance account was proposed suggest...

Journal: :Philosophical transactions of the Royal Society of London. Series B, Biological sciences 1982
M I Posner Y Cohen R D Rafal

A peripheral visual cue in an empty field (1) often summons head or eyes, or both, (2) improves efficiency at the cued position while attention is directed to it, even without overt movements, and (3) reduces processing efficiency at the cued position once attention is withdrawn. We have studied the time course and the effects of mid-brain and cortical damage on these components of orienting. T...

2012
Aveek Dutta Dola Saha Dirk Grunwald Douglas C. Sicker

In this paper we propose a novel approach to implement high capacity, covert channel by encoding covert information in the physical layer of common wireless communication protocols. We call our technique Dirty Constellation because we hide the covert messages within a “dirty” constellation that mimics noise commonly imposed by hardware imperfections and channel conditions. The cover traffic in ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید