نتایج جستجو برای: covert repair hypothesis

تعداد نتایج: 355225  

2006
Zbigniew Kotulski Wojciech Mazurczyk

In this paper a new way of exchanging information for Voice over Internet Protocol (VoIP) service is presented. With use of digital watermarking and steganography techniques we achieve a covert channel which can be used for different purposes e.g. to improve IP Telephony security or to alternate existing protocols like RTCP (Real-Time Control Protocol). Main advantage of this solution is that i...

2006
Bei Wang Jim Alves-Foss

The use of security policy enforcement mechanisms has been a topic in recent literature. Particular focus has been on the class of policies that can be enforced by these mechanisms but not on the security policy guiding the execution of the monitoring mechanisms. It has been a challenge to enforce information confidentiality in a multi-level secure system since malicious users can exploit cover...

2017
Olga Chen Catherine A. Meadows Gautam Trivedi

This paper is a survey of both methods that could be used to support stealthy communication over both wired and wireless networks and techniques for evaluating them. By stealthy communication we mean communication using channels that guarantee that the nature of the communication, or even the fact that communication is taking place at all, is hidden. Although stealthy communication and informat...

Journal: :Journal of cognitive neuroscience 2000
E Awh L Anllo-Vento S A Hillyard

We investigated the hypothesis that the covert focusing of spatial attention mediates the on-line maintenance of location information in spatial working memory. During the delay period of a spatial working-memory task, behaviorally irrelevant probe stimuli were flashed at both memorized and nonmemorized locations. Multichannel recordings of event-related potentials (ERPs) were used to assess vi...

2005
Michael Charles Perkins Jennifer Davidson Thomas Daniels

vi CHAPTER 1. GENERAL INTRODUCTION 1 1.1 Problem Statement 1 1.2 Thesis Organization 1 1.3 Overview of Network Covert Channels 2 1.4 Overview of Information Hiding in TCP/IP 3 1.5 Network Layer 5 1.5.1 Do not Fragment Bit 5 1.5.2 IP Identification Field 6 1.5.3 IP Header Checksum 6 1.5.4 ICMP Data 6 1.6 Transport Layer 7 1.6.1 TCP Time Stamps 7 1.6.2 Sequence and Acknowledgment Fields 9 1.7 Act...

Journal: :First Monday 1997
David Llamas Alan Miller Colin Allison

Information hiding techniques can be used by criminals and terrorists to communicate over covert channels within the TCP/IP protocol suite and can be used to overcome firewalls and most other forms of network intrusion detection and prevention systems. In this work we describe the covert channel concept and weaknesses in the five layered TCP/IP layered model. We then present an evaluation frame...

2010
Loïc Hélouët Aline Roumy

This paper presents an information theory based detection framework for covert channels. We first show that the usual notion of interference does not characterize the notion of deliberate information flow of covert channels. We then show that even an enhanced notion of “iterated multivalued interference” can not capture flows with capacity lower than one bit of information per channel use. We t...

2013
Alishia D. Williams

Compulsive buying (CB) is a proposed disorder of dysregulated buying behaviour that is associated with high rates of Axis I comorbidity, particularly depression and anxiety. It has been proposed that purchasing behaviours may serve as a maladaptive means of alleviating negative affect in vulnerable individuals. The aim of the current study was to experimentally manipulate affect to test this mo...

Background: We used a database of patients treated at three hospitals to study the primary null hypothesis that thereare no factors associated with unplanned reoperations or adverse events after surgical repair for diaphyseal claviclefracture. Additionally we addressed the following secondary study questions: 1. What is the prevalence of unplannedreoperations or adverse events...

2016
Aswini S Palani Raja

A Malware is a very big threat in today’s computing world. It continues to grow in volume and evolve in complexity. Modern malware uses advanced techniques to hide from static and dynamic analysis tools. The existing system uses classification based and regression based approach for detection. The proposed system utilizes the classification based approach and regression based approach for detec...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید