نتایج جستجو برای: covert index

تعداد نتایج: 400911  

Journal: :Appetite 2006
Jane Ogden Rebecca Reynolds Andrea Smith

The existing literature on parental control and children's diets is confusing. The present paper reports two studies to explore an expanded conceptualisation of parental control with a focus on overt control which 'can be detected by the child' and covert control which 'cannot be detected by the child'. In study 1, 297 parents of children aged between 4 and 11 completed a measure of overt contr...

2016
Monica Angelini Marta Calbi Annachiara Ferrari Beatrice Sbriscia-Fioretti Michele Franca Vittorio Gallese Maria Alessandra Umiltà

Proactive and reactive inhibition are generally intended as mechanisms allowing the withholding or suppression of overt movements. Nonetheless, inhibition could also play a pivotal role during covert actions (i.e., potential motor acts not overtly performed, despite the activation of the motor system), such as Motor Imagery (MI). In a previous EEG study, we analyzed cerebral activities reactive...

2015
Billy Bob Brumley

Covert channels are a fundamental concept for cryptanalytic side-channel attacks. Covert timing channels use latency to carry data, and are the foundation for timing and cache-timing attacks. Covert storage channels instead utilize existing system bits to carry data, and are not historically used for cryptanalytic side-channel attacks. This paper introduces a new storage channel made available ...

2009
Toby C. Murray Gavin Lowe

We consider the problem of detecting covert channels within security-enforcing object-capability patterns. Traditional formalisms for reasoning about the security properties of object-capability patterns require one to be aware, a priori, of all possible mechanisms for covert information flow that might be present within a pattern, in order to detect covert channels within it. We show how the C...

2018
Moslem Forouzesh Paeiz Azmi Nader Mokari Kai Kit Wong

This letter studies and compares the physical-layer security approach and the covert communication approach for a wiretap channel with a transmitter, an intended receiver and an eavesdropper. In order to make the comparison, we investigate the power allocation problems for maximizing the secrecy/covert rate subject to the transmit power constraint. Simulation results illustrate that if the eave...

Journal: :Stroke 2012
Beverly G Windham Michael E Griswold Dean Shibata Alan Penman Diane J Catellier Thomas H Mosley

BACKGROUND AND PURPOSE Unrecognized or unreported stroke-like symptoms, called covert symptoms, occur in persons free of clinical stroke. Whether covert symptoms are associated with subclinical brain infarcts (SBIs) is unknown. This study examined the association between covert stroke-like symptoms and SBI/stroke in persons with no history of stroke or transient ischemic attack. METHODS A tot...

2014
Stéphanie Martin Peter Brunner Chris Holdgraf Hans-Jochen Heinze Nathan E. Crone Jochem Rieger Gerwin Schalk Robert T. Knight Brian N. Pasley

Auditory perception and auditory imagery have been shown to activate overlapping brain regions. We hypothesized that these phenomena also share a common underlying neural representation. To assess this, we used electrocorticography intracranial recordings from epileptic patients performing an out loud or a silent reading task. In these tasks, short stories scrolled across a video screen in two ...

2004
Sandeep Bhadra Sanjay Shakkottai Sriram Vishwanath

This paper uses jamming legitimate transmissions over a slotted ALOHA system as a means of covert communication. The resulting covert channel is found to be source dependent, and to have infinite memory. Hence, a characterization of the capacity of covert communication over such a medium is an inherently complex problem. Employing i.i.d. jamming strategies, this paper derives achievable rates f...

1993
GEORGE G. MEADE

A Guide to Understanding Covert Channel Analysis of Trusted Systems provides a set of good practices related to covert channel analysis. We have written this guide to help the vendor and evaluator communities understand the requirements for covert channel analysis as described in the Department of Defense Trusted Computer System Evaluation Criteria (TCSEC). In an effort to provide guidance, we ...

2006
Zbigniew Kotulski Wojciech Mazurczyk

In this paper a new way of exchanging information for Voice over Internet Protocol (VoIP) service is presented. With use of digital watermarking and steganography techniques we achieve a covert channel which can be used for different purposes e.g. to improve IP Telephony security or to alternate existing protocols like RTCP (Real-Time Control Protocol). Main advantage of this solution is that i...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید