نتایج جستجو برای: covert index

تعداد نتایج: 400911  

2006
Bei Wang Jim Alves-Foss

The use of security policy enforcement mechanisms has been a topic in recent literature. Particular focus has been on the class of policies that can be enforced by these mechanisms but not on the security policy guiding the execution of the monitoring mechanisms. It has been a challenge to enforce information confidentiality in a multi-level secure system since malicious users can exploit cover...

2017
Olga Chen Catherine A. Meadows Gautam Trivedi

This paper is a survey of both methods that could be used to support stealthy communication over both wired and wireless networks and techniques for evaluating them. By stealthy communication we mean communication using channels that guarantee that the nature of the communication, or even the fact that communication is taking place at all, is hidden. Although stealthy communication and informat...

Journal: :First Monday 1997
David Llamas Alan Miller Colin Allison

Information hiding techniques can be used by criminals and terrorists to communicate over covert channels within the TCP/IP protocol suite and can be used to overcome firewalls and most other forms of network intrusion detection and prevention systems. In this work we describe the covert channel concept and weaknesses in the five layered TCP/IP layered model. We then present an evaluation frame...

2010
Loïc Hélouët Aline Roumy

This paper presents an information theory based detection framework for covert channels. We first show that the usual notion of interference does not characterize the notion of deliberate information flow of covert channels. We then show that even an enhanced notion of “iterated multivalued interference” can not capture flows with capacity lower than one bit of information per channel use. We t...

2016
Aswini S Palani Raja

A Malware is a very big threat in today’s computing world. It continues to grow in volume and evolve in complexity. Modern malware uses advanced techniques to hide from static and dynamic analysis tools. The existing system uses classification based and regression based approach for detection. The proposed system utilizes the classification based approach and regression based approach for detec...

Journal: :journal of rehabilitation sciences and research 0
maryam vahab department of speech therapy, school of rehabilitation sciences, shiraz university of medical sciences, shiraz, iran karim shojaei alireza ahmadi mohammad nasiri

background : one language-related area that has recently received more attention from researchers working in the field of stuttering is phonological working memory. this article aimed to identify phonological skills of working memory in children with stuttering in comparison with normal children, and to obtain the relationship between the increase in the number of syllables in non-words and the...

2009
Sarah H. Sellke Chih-Chun Wang Saurabh Bagchi Ness B. Shroff

Web traffic accounts for more than half of Internet traffic today. Camouflaging covert timing channels in Web traffic would be advantageous for concealment. In this paper, we investigate the possibility of disguising network covert timing channels as HTTP traffic to avoid detection. Extensive research has shown that Internet traffic, including HTTP traffic, exhibits self-similarity and long ran...

Journal: :The European journal of neuroscience 2010
Simon P Kelly John J Foxe Geoffrey Newman Jay A Edelman

When preparing to make a saccadic eye movement in a cued direction, perception of stimuli at the target location is enhanced, just as it is when attention is covertly deployed there. Accordingly, the timing and anatomical sources of preparatory brain activity accompanying shifts of covert attention and saccade preparation tend to exhibit a large degree of overlap. However, there is evidence tha...

2017
Yang Zhou Lixin Liang Yujun Pan Ning Qian Mingsha Zhang

The site of overt attention (fixation point) defines a spatial reference center that affects visuomotor response as indicated by the stimulus-response-compatibility (SRC) effect: When subjects press, e.g., a left key to report stimuli, their reaction time is shorter when stimuli appear to the left than to the right of the fixation. Covert attention to a peripheral site appears to define a simil...

2011
Jason Jaskolka Ridha Khedri Khair Eddin Sabri

With the emergence of computers in every day activities and with the ever-growing complexity of networks and network communication protocols, covert channels are becoming an eminent threat to the confidentiality of information. In light of this threat, we propose a technique to detect confidential information leakage via covert channels. Although several works examine covert channel detection a...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید