نتایج جستجو برای: covert repair hypothesis

تعداد نتایج: 355225  

2013
Aisha Fernandes

The boom of covert communication coincides with the appearance and growth of the Internet. The rapid spread of computer networks and shift to digitization of media has created a very favourable environment for covert communication. In this paper, some Covert communication techniques have been described. Covert or secure communication includes methods such as cryptography, steganography and wate...

Journal: :acta medica iranica 0
shokoufeh hajsadeghi department of cardiology, rasul-e-akramhospital, tehran university of medical sciences, tehran, iran. maral hejrati department of cardiology, tehran university of medical sciences, tehran, iran. samar moghadami department of cardiology, tehran university of medical sciences, tehran, iran. sahar rismantab internal medicine, rasul-e-akram hospital, tehran university of medical sciences, tehran, iran. parva namiranian department of cardiology, tehran university of medical sciences, tehran, iran.

xerodermapigmentosum (xp), is an autosomal recessivegenetic disorder of dna repair in which the ability to repair damage caused by ultraviolet (uv) light is deficient. the oxidative stress caused by decline catalase activity as an antioxidant enzyme, has been illustrated in these patients. this is the first case report of dilated cardiomyopathy in two patients with xp, a 26 year old girl and he...

Journal: :CoRR 2017
Si-Hyeon Lee Ligong Wang Ashish Khisti Gregory W. Wornell

We consider the problem of covert communication over a state-dependent channel, where the transmitter has causal or noncausal knowledge of the channel states. Here, “covert” means that a warden on the channel should observe similar statistics when the transmitter is sending a message and when it is not. When a sufficiently long secret key is shared between the transmitter and the receiver, we d...

2016
Joseph Desimone Daryl Johnson Bo Yuan Peter Lutz

Covert channels have the unique quality of masking evidence that a communication has ever occurred between two parties. For spies and terrorist cells, this quality can be the difference between life and death. However, even the detection of communications in a botnet could be troublesome for its creators. To evade detection and prevent insights into the size and members of a botnet, covert chan...

2015
Jiangtao Zhai Mingqian Wang Guangjie Liu Yuewei Dai

Network covert channel is a technology that transfers information secretly through the computer network. The length-based covert channel is one of the most popular covert channels. Most of the existing length-based schemes are vulnerable to detections due to the abnormal statistical features of the covert traffic. In this paper, a Skype-based length covert channel SkyLen is proposed. The propos...

2017
Félix Iglesias Valentin Bernhardt Robert Annessi Tanja Zseby

The detection of covert channels in communication networks is a current security challenge. By clandestinely transferring information, covert channels are able to circumvent security barriers, compromise systems, and facilitate data leakage. A set of statistical methods called DAT (Descriptive Analytics of Traffic) has been previously proposed as a general approach for detecting covert channels...

2012
Steffen Wendzel Jörg Keller

Within the last years, new techniques for network covert channels arose, such as covert channel overlay networking, protocol switching covert channels, and adaptive covert channels. These techniques have in common that they rely on covert channel-internal control protocols (so called micro protocols) placed within the hidden bits of a covert channel’s payload. An adaptable approach for the engi...

2008
Sebastian Zander

Communication is not necessarily made secure by the use of encryption alone. The mere existence of communication is often enough to raise suspicion and trigger investigative actions. Covert channels aim to hide the very existence of the communication. The huge amount of data and vast number of different protocols in the Internet makes it ideal as a high-bandwidth vehicle for covert communicatio...

Journal: :Neuron 2018
Saurabh Vyas Nir Even-Chen Sergey D Stavisky Stephen I Ryu Paul Nuyujukian Krishna V Shenoy

Covert motor learning can sometimes transfer to overt behavior. We investigated the neural mechanism underlying transfer by constructing a two-context paradigm. Subjects performed cursor movements either overtly using arm movements, or covertly via a brain-machine interface that moves the cursor based on motor cortical activity (in lieu of arm movement). These tasks helped evaluate whether and ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید