A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2019; you can also visit the original URL.
The file type is application/pdf
.
Filters
The Sound and the Fury: Hiding Communications in Noisy Wireless Networks with Interference Uncertainty
[article]
2018
arXiv
pre-print
From the network perspective, the communications are hidden in "the sound and the fury" of noisy wireless networks, and what Willie sees is merely a "shadow" wireless network. ...
Covert communication can prevent the adversary from knowing that a wireless transmission has occurred. ...
We found that the random interference in a large-scale wireless network makes the network a "shadow network" to Willie, and can achieve a high spatial throughput. 2) Leveraging on analysis and simulation ...
arXiv:1712.05099v3
fatcat:vncsl4r4jbaspddbfqkf7k3ivi
Covert channels in multiplayer first person shooter online games
2008
2008 33rd IEEE Conference on Local Computer Networks (LCN)
We empirically analyse the covert channel's bit rate, and compare the statistical characteristics of unmodified game traffic with those of game traffic carrying covert information. ...
We encode covert bits as slight, yet continuous, variations of a player's character's movements. ...
ACKNOWLEDGEMENTS We thank Lucas Parry, Lawrence Stewart and Kewin Stoeckigt for being tough opponents in the Q3 tests. ...
doi:10.1109/lcn.2008.4664172
dblp:conf/lcn/ZanderAB08
fatcat:h3em7gqrujejjdjb7t5qi5q4oe
Interference Management in 5G and Beyond Network: Requirements, Challenges and Future Directions
2021
IEEE Access
In the modern technological world, wireless communication has taken a massive leap from the conventional communication system to a new radio communication network. ...
To provide new insight into interference issue management for the next-generation network, we address and explore various relevant topics in each section that help make the system more robust. ...
According to the wireless network technologies analysis, the next-generation cellular network is expected to deliver each user with ultrareliable connectivity via multiple devices anywhere and anytime ...
doi:10.1109/access.2021.3073543
fatcat:pszxfc6abbg6lkdf2yegsiobfy
Illustrative risks to the public in the use of computer systems and related technology
1994
Software engineering notes
free wireless network; great opportunity for launching spam and security attacks (R 21 89) Sf Fingerprint scanner interfaces with built-in wireless LAN network card, defeating intended security (R 21 ...
over a month -despite "security codes" (R 21 39,41) Sh Foolish wireless network access policies provides safe harbor for spam, etc. ...
Saudi Arabian uses computer to organize harem; it runs him ragged (S 13 2) f Computer error blamed for French diplomatic fiasco (S 13 2) -Computer service selects ex-wife as "ideal" mate for divorced man ...
doi:10.1145/181610.181612
fatcat:qfzxpio6tfgl5nmbevta334afi
Illustrative risks to the public in the use of computer systems and related technology
1996
Software engineering notes
free wireless network; great opportunity for launching spam and security attacks (R 21 89) Sf Fingerprint scanner interfaces with built-in wireless LAN network card, defeating intended security (R 21 ...
over a month -despite "security codes" (R 21 39,41) Sh Foolish wireless network access policies provides safe harbor for spam, etc. ...
Saudi Arabian uses computer to organize harem; it runs him ragged (S 13 2) f Computer error blamed for French diplomatic fiasco (S 13 2) -Computer service selects ex-wife as "ideal" mate for divorced man ...
doi:10.1145/381790.381797
fatcat:kcxte3luzrg57ms3gwwbqzs5ji
Illustrative risks to the public in the use of computer systems and related technology
1992
Software engineering notes
free wireless network; great opportunity for launching spam and security attacks (R 21 89) Sf Fingerprint scanner interfaces with built-in wireless LAN network card, defeating intended security (R 21 ...
over a month -despite "security codes" (R 21 39,41) Sh Foolish wireless network access policies provides safe harbor for spam, etc. ...
Saudi Arabian uses computer to organize harem; it runs him ragged (S 13 2) f Computer error blamed for French diplomatic fiasco (S 13 2) -Computer service selects ex-wife as "ideal" mate for divorced man ...
doi:10.1145/134292.134293
fatcat:ayrwcbvvljhrdeav5kvrxaycs4
Illustrative Risks To The Public In The Use Of Computer Systems And Related Technology
Symposium Record Policy Issues in Information and Communication Technologies in Medical Applications
free wireless network; great opportunity for launching spam and security attacks (R 21 89) Sf Fingerprint scanner interfaces with built-in wireless LAN network card, defeating intended security (R 21 ...
over a month -despite "security codes" (R 21 39,41) Sh Foolish wireless network access policies provides safe harbor for spam, etc. ...
Saudi Arabian uses computer to organize harem; it runs him ragged (S 13 2) f Computer error blamed for French diplomatic fiasco (S 13 2) -Computer service selects ex-wife as "ideal" mate for divorced man ...
doi:10.1109/ictma.1988.669591
fatcat:wkl3mbqyjbdmfhy4wezuzx4juq