نتایج جستجو برای: covert index

تعداد نتایج: 400911  

2010
Lei Wei Michael K. Reiter Ketan Mayer-Patel

Numerous network anomaly detection techniques utilize traffic summaries (e.g., NetFlow records) to detect and diagnose attacks. In this paper we investigate the limits of such approaches, by introducing a technique by which compromised hosts can communicate without altering the behavior of the network as evidenced in summary records of many common types. Our technique builds on two key observat...

Journal: :Journal of personality 2009
Avi Besser Beatriz Priel

These studies tested the associations between responses to an induced imaginary romantic rejection and individual differences on dimensions of attachment and covert narcissism. In Study 1 (N=125), we examined the associations between attachment dimensions and emotional responses to a vignette depicting a scenario of romantic rejection, as measured by self-reported negative mood states, expressi...

2012
Hui Tian Ke Zhou Jing Lu

Steganography over real-time streaming media is a novel and promising research subject. This paper performs steganography over a typical streaming media, Voice over IP (VoIP), and suggests a new covert communication scheme for interactive secret messages. To resist the statistical detection, a sophisticated compounded pseudorandom sequence, produced by a compounded pseudorandom number generator...

2014
Jason Jaskolka Ridha Khédri Khair Eddin Sabri

This is Part I in a two-part series discussing the development of investigative support for information confidentiality. In this paper, we propose a technique to detect confidential information leakage via protocol-based covert channels based on relation algebra. It provides tests to verify the existence of an information leakage via a monitored covert channel as well as computations which show...

Journal: :CoRR 2017
Jinsong Hu Khurram Shahzad Shihao Yan Xiangyun Zhou Feng Shu Jun Li

In this work, we propose a covert communication scheme where the transmitter attempts to hide its transmission to a full-duplex receiver, from a warden that is to detect this covert transmission using a radiometer. Specifically, we first derive the detection error rate at the warden, based on which the optimal detection threshold for its radiometer is analytically determined and its expected de...

Journal: :Clinical linguistics & phonetics 2017
Sarah K Schellinger Benjamin Munson Jan Edwards

Past studies have shown incontrovertible evidence for the existence of covert contrasts in children's speech, i.e. differences between target productions that are nonetheless transcribed with the same phonetic symbol. Moreover, there is evidence that these are relevant to forming prognoses and tracking progress in children with speech sound disorder. A challenge remains to determine the most ef...

2016
Louisa V. Kulke Janette Atkinson Oliver Braddick

Research on neural mechanisms of attention has generally instructed subjects to direct attention covertly while maintaining a fixed gaze. This study combined simultaneous eye tracking and electroencephalogram (EEG) to measure neural attention responses during exogenous cueing in overt attention shifts (with saccadic eye movements to a target) and compared these with covert attention shifts (res...

2014
Jason Jaskolka Ridha Khédri

An integral part of safeguarding systems of communicating agents from covert channel communication is having the ability to identify when a covert channel may exist in a given system and which agents are more prone to covert channels than others. In this paper, we propose a formulation of one of the necessary conditions for the existence of covert channels: the potential for communication condi...

2016
S. Karthika S. Bose A. Kannan

The homeland security has become a very significant consideration for all the Governments throughout the world. To improve the OPerational SECurity (OPSEC), multi relational graphs were introduced for Covert Network Analysis (CNA). In this paper, proposed SpyNetMiner system identifies the key players who maximally influence the covert network. Abnormality of the nodes is analyzed based on the p...

Journal: :Psychological reports 2009
Hessel J Zondag Cor Van Halen Joanna Wojtkowiak

This article reports a study of the relation between narcissism as a personality characteristic and the cultural dimension of individualism/collectivism. Participants from a more collectivistic society (Poland; n = 167) were compared with participants from a more individualistic society (The Netherlands; n = 156). Two dimensions of narcissism were distinguished: overt and covert. The cultural t...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید