Filters








8,995 Hits in 2.6 sec

Covert Communication Networks in Hostile Environments

Kiseon Kim, Jalel Ben-Othman, Prem Mahalik
2018 Security and Communication Networks  
environments, countermeasures against covert communication network, system performance modeling and simulation in hostile environments, reliability and survivability for susceptible networks, emerging  ...  This special issue presents several research results in covert communication networks in hostile environments, including the identification of current challenges for each domain, the development of novel  ...  environments, countermeasures against covert communication network, system performance modeling and simulation in hostile environments, reliability and survivability for susceptible networks, emerging  ... 
doi:10.1155/2018/2731859 fatcat:jnxperelkff2tdd2axotf7tvcm

The Influence of Secrecy on the Communication Structure of Covert Networks

Roy H. A. Lindelauf, Peter E. M. Borm, Herbert Hamers
2008 Social Science Research Network  
We use elements from game theory and graph theory to determine the 'optimal' communication structure a covert network should adopt.  ...  Assuming uniform exposure probability of individuals in the network we show that the Nash bargaining solution corresponds to either a network with a central individual (the star graph) or an all-to-all  ...  Finally, the communication structure of a covert network that passed its initial stages in a hostile environment was analyzed (i.e., jihadi networks in Europe).  ... 
doi:10.2139/ssrn.1096057 fatcat:olka76fz5fhxzmwut4hbczl6be

The influence of secrecy on the communication structure of covert networks

Roy Lindelauf, Peter Borm, Herbert Hamers
2009 Social Networks  
We use elements from game theory and graph theory to determine the 'optimal' communication structure a covert network should adopt.  ...  Assuming uniform exposure probability of individuals in the network we show that the Nash bargaining solution corresponds to either a network with a central individual (the star graph) or an all-to-all  ...  Finally, the communication structure of a covert network that passed its initial stages in a hostile environment was analyzed (i.e., jihadi networks in Europe).  ... 
doi:10.1016/j.socnet.2008.12.003 fatcat:no3tfjawxvdlvmrytncpj74dkm

Predictive analysis of concealed social network activities based on communication technology choices: early-warning detection of attack signals from terrorist organizations

Katya Drozdova, Michael Samoilov
2009 Computational and mathematical organization theory  
This study develops an approach to analyzing technological means rather than content of communications produced within the social networks comprising covert organizations, and shows how it can be applied  ...  Terrorist threat prevention and counteraction require timely detection of hostile plans.  ...  Acknowledgements The authors would like to thank the anonymous reviewers for their comments and critiques that have been very helpful in improving this manuscript.  ... 
doi:10.1007/s10588-009-9058-2 fatcat:odubysrk7baohdri5qjouu65ia

A Light-Weight Authentication Scheme for Air Force Internet of Things [article]

Xi Hang Cao and Xiaojiang Du and E. Paul Ratazzi
2019 arXiv   pre-print
While the majority of research focuses on smart IoT devices, treatments for legacy dumb network-ready devices are lacking; moreover, IoT devices deployed in a hostile environment are often required to  ...  Internet of Things (IoT) is ubiquitous because of its broad applications and the advance in communication technologies.  ...  In a battlefield or hostile environment, adversarial UAVs and sensors are expected.  ... 
arXiv:1902.03282v1 fatcat:tfa6qt5ka5h4te5mmzzuy67kgm

Extreme Methods: Researching Deviance, Social Harm and Control

Olga Petintseva
2019 Journal of Extreme Anthropology  
In recent decades, developments in criminology, anthropology, sociology, political sciences, development studies, media studies, and other disciplines have instigated the use of a wide array of innovative  ...  sensitive topics and transgressive practices, to trying to acquire a deep understanding of lived experiences and phenomenology of crime and victimization -methodological discussions have been ongoing in  ...  In the fall of 2020, the second Between Edges and Margins Conference will take place in Kent and it warmly welcomes members of the Extreme Anthropology Research Network and readers of the Journal of Extreme  ... 
doi:10.5617/jea.7104 fatcat:lq77xiho3rhrvgtfplp4mpoqt4

Lessons Learned from Building a High-Assurance Crypto Gateway

Clark Weissman, Timothy Levin
2011 IEEE Security and Privacy  
Acknowledgments Steven Greenwald and Cynthia Irvine helped considerably in reviewing a preliminary version of this document. Brant Hashii built much of eSS.  ...  Essentially, it's the confidence that a product performs as specified and does nothing else, satisfying its advertised claim even in a hostile environment.  ...  It was originally designed as a benign environment with cooperating users rather than the hostile users with which it operates today.  ... 
doi:10.1109/msp.2010.201 fatcat:k5zvshjmbndstgqtjt43ohdxzy

Overview of Cyber Science and Technology Programs at the U.S. Army Research Laboratory [article]

Alexander Kott
2017 arXiv   pre-print
This paper provides an overview of research programs in cyber security performed by the U.S Army Research Laboratory. Although ARL is the U.S.  ...  In the year 2040, it will be a highly converged virtual-physical space, where cyber operations will be an integral part of the battle.  ...  The comprehensive portfolio of ARL's research in detection of hostile cyber activities is based on close integration with practical network defense operations.  ... 
arXiv:1702.04652v1 fatcat:perymnxp2je6tjjx7jro4sw224

Digital Communication and Hybrid Threats

Rubén Arcos, Hanna Smith
2021 La Revista Icono 14  
Estas herramientas son empleadas por actores autoritarios hostiles y / o en una escala que ha interferido en procesos democráticos como las elecciones, erosiona la confianza en las instituciones, polariza  ...  obtenemos información y construimos conciencia sobre el mundo y sus eventos e interactuamos con los demás, pero al mismo tiempo crean oportunidades para realizar operaciones e influenciar con una intención hostil  ...  However, today our digital communication environment and the communication tools that we employ for legitimate purposes are also being employed by hostile authoritarian actors and/or their proxies at a  ... 
doi:10.7195/ri14.v19i1.1662 fatcat:vy27mqqb6ze2tkmsnt5rvos4pe

Secrecy and Covert Communications against UAV Surveillance via Multi-Hop Networks [article]

Hui-Ming Wang, Yan Zhang, Xu Zhang, Zhetao Li
2019 arXiv   pre-print
The security and covert communication problems for a pair of terrestrial nodes against UAV surveillance are considered in this paper.  ...  In the covert communication problem, under the constraints of the detection error rate and aggregate power, the sub-problem of transmit power allocation is a convex problem and can be solved numerically  ...  COVERT COMMUNICATION OPTIMIZATION In this section, we discuss the solution of the covert communication optimization problem (20) .  ... 
arXiv:1910.09197v1 fatcat:fppcs3lyzjfr7atkmhbcd4qoca

Realizing an 802.11-based covert timing channel using off-the-shelf wireless cards

Sakthi V. Radhakrishnan, A. Selcuk Uluagac, Raheem Beyah
2013 2013 IEEE Global Communications Conference (GLOBECOM)  
This same method of obfuscation can be used by legitimate users to transmit messages over hostile networks.  ...  These schemes introduce randomness in the network that provides good cover for a covert timing channel.  ...  to transmit messages over hostile networks.  ... 
doi:10.1109/glocom.2013.6831158 dblp:conf/globecom/RadhakrishnanUB13 fatcat:lzxb6c4yirbvpnpiemmifbmomq

Preventative steganalysis in wireless visual sensor networks: Challenges and solutions

Julien S. Jainsky, Deepa Kundur
2011 2011 IEEE International Conference on Multimedia and Expo  
the presence of covert communications.  ...  In this paper, we present the problem of preventative steganalysis that addresses steganographic issues in wireless visual sensor networks.  ...  These images captured by every node, or camera, of the network represent a rich environment for hiding data to facilitate covert communication via the process of steganography.  ... 
doi:10.1109/icme.2011.6012224 dblp:conf/icmcs/JainskyK11 fatcat:ok3e4rz2djai3ncn5eq3unuv2e

Page 4651 of Psychological Abstracts Vol. 82, Issue 10 [page]

1995 Psychological Abstracts  
—Examined the relationship between an abusive environment within the family and proneness to shame, guilt, anger, and hostility in 107 male and 101 female undergraduates.  ...  Shame proneness was related to covert hostility and unexpressed anger for both men and women. 37215. Hydén, Margareta.  ... 

Course Syllabus. Strategic Communication to Counter Security Threats in the Disinformation Era

Rubén Arcos Martín, Irena Chiru, Mihaela Teodor, Cristina Ivan, Ileana-Cinziana Surdu, Georgios Chasapis, Vagia Poutouroudi, Andriani Retzepi, Konstantinos Tigkas, Giorgos Triantafyllou, Manuel Gértrudix-Barrio
2020 Zenodo  
This document is the O2 deliverable of the CRESCENT, Strategic Communication to Counter Security Threats in the Disinformation Era.  ...  Mind the gap in media CoveRagE and Strategic communication in CasE of security Threats – the development of critical thinking and responsible reaction, adn Strategic partnership project within ERASMUS+  ...  The course is developed in collaboration between: "Mihai Viteazul" National Intelligence Academy (  ... 
doi:10.5281/zenodo.3870725 fatcat:fiudwdgf5nasjigu3gnteogoly

A Study on the Concept of Using Efficient Lightweight Hash Chain to Improve Authentication in VMF Military Standard

Dohoon Kim, Sang Seo, Heesang Kim, Won Gi Lim, Youn Kyu Lee
2020 Applied Sciences  
This is because TDL and MTN require maximum tactical security, communication integrity, and low network overhead based on many protocol header bits for rapid communication with limited network resources  ...  high-level digital-covert activities and deception tactics are implemented.  ...  Functional support and availability for rapidly changing battlefield environments and secure lightweight communication for covert activities are also required.  ... 
doi:10.3390/app10248999 fatcat:fn3ymbeo4vhcxlbhvlbnsfn5eu
« Previous Showing results 1 — 15 out of 8,995 results