نتایج جستجو برای: covert index

تعداد نتایج: 400911  

2015
Kyle Denney A. Selcuk Uluagac Kemal Akkaya Nico Saputro

Covert channels have been used as a means to circumvent security measures and leak sensitive data undetectable to an onlooker. While these channels have been used in a lot of networks, their applications on mobile devices have just started to be seen. Recently, many covert channels in Android systems have been presented utilizing various available system resources. This demo aims to show how a ...

2016
Chaim Sanders Jacob Valletta Bo Yuan Daryl Johnson

The detection of covert channels has quickly become a vital need due to their pervasive nature and the increasing popularity of the Internet. In recent years, new and innovative methods have been proposed to aid in the detection of covert channels. Existing detection schemes are often too specific and are ineffective against new covert channels. In this paper, we expound upon previous work done...

Journal: :Child development 2007
Linda Van Leijenhorst Eveline A Crone Maurits W Van der Molen

This study examined developmental trends in object and spatial working memory (WM) using heart rate (HR) to provide an index of covert cognitive processes. Participants in 4 age groups (6-7, 9-10, 11-12, 18-26, n=20 each) performed object and spatial WM tasks, in which each trial was followed by feedback. Spatial WM task performance reached adult levels before object WM task performance. The di...

2015
Aravind Venkataraman ARAVIND VENKATARAMAN Raheem A. Beyah Xiaojun Cao Anu Bourgeois

We propose a simple, passive and deployable approach for fingerprinting traffic on the wired side as a solution for three critical stealth attacks in wireless networks. We focus on extracting traces of the 802.11 medium access control (MAC) protocol from the temporal arrival patterns of incoming traffic streams as seen on the wired side, to identify attacker behavior. Attacks addressed include ...

Journal: :IEEE Trans. Signal Processing 2003
Darko Kirovski Henrique S. Malvar

Watermarking has become a technology of choice for a broad range of multimedia copyright protection applications. Watermarks have also been used to embed formatindependent metadata in audio/video signals, in a way that is robust to common editing. In this paper, we present several novel mechanisms for effective encoding and detection of directsequence spread-spectrum watermarks in audio signals...

2017

Covert computation (of general functions) strengthens the notion of secure computation so that the computation hides not only everything about the participants’ inputs, except for what is revealed by the function output, but it also hides the very fact that the computation is taking place, by ensuring that protocol participants are indistinguishable from random beacons, except when the function...

ژورنال: سلامت کار ایران 2015

Background and aims: The main objective of this research was finding the relations between musculoskeletal disorders and depression and anxiety (overt and covert) in emergency staff of hospitals covered by Shahid Beheshti University of Medical Sciences. Methods: The research was descriptive- analytical study. Out of 600 staff of hospitals covered by Shahid Beheshti University of Medical Science...

2003
Mohamed Marzouqi

T s s a target itself. Another example is to guard a secured environment, where it is important to be covert as well as overt at the same time, in this way the chances are higher for the robot to see an intruder before the opposite happens. A covert robot may be used as well for hostage rescue, for example by sending an insect size covert robot with a camera to the hostage area to send images t...

2017
Mandeep Kaur

Covert network timing channels control time between transmissions of packets in overt network communication and transmits hidden messages. This paper presents an overview of different concepts of covert timing channels such as types, features and properties. There is range of terms used for security of information such as encryption, covert channels, network steganography or information hiding ...

2016
D. Anthony D. Johnson P. Lutz B. Yuan

This paper presents a new behavior based covert channel utilizing the database update mechanism of anti-virus software. It is highly covert due to unattended, frequent, automatic signature database update operations performed by the software. The design of the covert channel is described; its properties are discussed and demonstrated by a reference implementation. This paper uses these points t...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید