نتایج جستجو برای: covert repair hypothesis
تعداد نتایج: 355225 فیلتر نتایج به سال:
Covert channels emerged in mystery and departed in
Functional magnetic resonance imaging (fMRI) and surface-based representations of brain activity were used to compare the functional anatomy of two tasks, one involving covert shifts of attention to peripheral visual stimuli, the other involving both attentional and saccadic shifts to the same stimuli. Overlapping regional networks in parietal, frontal, and temporal lobes were active in both ta...
Demonstration of A Novel Storage Covert Channel on Android Smartwatch Using Status Bar Notifications
Covert channels have been used as a means to circumvent security measures and leak sensitive data undetectable to an onlooker. While these channels have been used in a lot of networks, their applications on mobile devices have just started to be seen. Recently, many covert channels in Android systems have been presented utilizing various available system resources. This demo aims to show how a ...
The detection of covert channels has quickly become a vital need due to their pervasive nature and the increasing popularity of the Internet. In recent years, new and innovative methods have been proposed to aid in the detection of covert channels. Existing detection schemes are often too specific and are ineffective against new covert channels. In this paper, we expound upon previous work done...
Prefrontal cortex (PFC) and posterior parietal cortex (PPC) are neural substrates for spatial cognition. We here review studies in which we tested the hypothesis that human frontoparietal cortex may function as a priority map. According to priority map theory, objects or locations in the visual world are represented by neural activity that is proportional to their attentional priority. Using fu...
Covert computation (of general functions) strengthens the notion of secure computation so that the computation hides not only everything about the participants’ inputs, except for what is revealed by the function output, but it also hides the very fact that the computation is taking place, by ensuring that protocol participants are indistinguishable from random beacons, except when the function...
Background and aims: The main objective of this research was finding the relations between musculoskeletal disorders and depression and anxiety (overt and covert) in emergency staff of hospitals covered by Shahid Beheshti University of Medical Sciences. Methods: The research was descriptive- analytical study. Out of 600 staff of hospitals covered by Shahid Beheshti University of Medical Science...
T s s a target itself. Another example is to guard a secured environment, where it is important to be covert as well as overt at the same time, in this way the chances are higher for the robot to see an intruder before the opposite happens. A covert robot may be used as well for hostage rescue, for example by sending an insect size covert robot with a camera to the hostage area to send images t...
Covert network timing channels control time between transmissions of packets in overt network communication and transmits hidden messages. This paper presents an overview of different concepts of covert timing channels such as types, features and properties. There is range of terms used for security of information such as encryption, covert channels, network steganography or information hiding ...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید