نتایج جستجو برای: covert repair hypothesis

تعداد نتایج: 355225  

2006
Serdar Cabuk C. W. Clifton N. B. Shroff V. Balakrishnan

Cabuk, Serdar Ph.D., Purdue University, December, 2006. Network Covert Channels: Design, Analysis, Detection, and Elimination. Major Professors: Carla E. Brodley and Eugene H. Spafford. Indirect communication channels have been effectively employed in the communications world to bypass mechanisms that do not permit direct communication between unauthorized parties. Such covert channels emerge a...

2012
Zhenyu Wu Zhang Xu Haining Wang

Information security and privacy in general are major concerns that impede enterprise adaptation of shared or public cloud computing. Specifically, the concern of virtual machine (VM) physical co-residency stems from the threat that hostile tenants can leverage various forms of side channels (such as cache covert channels) to exfiltrate sensitive information of victims on the same physical syst...

2006
Serdar Cabuk C. W. Clifton N. B. Shroff V. Balakrishnan

Cabuk, Serdar Ph.D., Purdue University, December, 2006. Network Covert Channels: Design, Analysis, Detection, and Elimination. Major Professors: Carla E. Brodley and Eugene H. Spafford. Indirect communication channels have been effectively employed in the communications world to bypass mechanisms that do not permit direct communication between unauthorized parties. Such covert channels emerge a...

Journal: :Physical Review Letters 2016

Journal: :Archives of Disease in Childhood 2000

2004
YAO WANG MINGZENG HU BIN LI

Covert channels and tunneling approaches are becoming a severe threat to information security. Penetration tools are employed to transit sensitive information through authorized streams. Since many current solutions are based on expert’s experiences or latter-wit, a self-learning detection and analysis system is starved for. A data mining framework for Covert Channel Detection and Analysis Syst...

Journal: :Cortex; a journal devoted to the study of the nervous system and behavior 1995
S R Schweinberger T Klos W Sommer

Covert face recognition was investigated in a patient with prosopagnosia without object agnosia. This patient performed well in various face processing tasks like expression analysis and feature processing and had relatively preserved semantic knowledge about persons, but was slightly impaired in the visual matching of unfamiliar faces. In face-name paired-associate relearning task, covert face...

Journal: :JNW 2012
Yinpu Zhang

Based on the security of information transmission through network in the information society, the paper puts forward covert communication technology which is more reliable than the prior encryption algorithm, analyzes channel covertness and information hiding of covert communication technology based on spread-spectrum communication technology, and establishes a covert communication system inclu...

Journal: :CoRR 2015
Wolfgang Schmidt Michael Hanspach Jörg Keller

Covert channels can be utilized to secretly deliver information from high privileged processes to low privileged processes in the context of a high-assurance computing system. In this case study, we investigate the possibility of covert channel establishment via software caches in the context of a framework for component-based operating systems. While component-based operating systems offer sec...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید