Filters








7 Hits in 6.2 sec

The Sound and the Fury: Hiding Communications in Noisy Wireless Networks with Interference Uncertainty [article]

Zhihong Liu, Jiajia Liu, Yong Zeng, Li Yang, Jianfeng Ma
2018 arXiv   pre-print
From the network perspective, the communications are hidden in "the sound and the fury" of noisy wireless networks, and what Willie sees is merely a "shadow" wireless network.  ...  Covert communication can prevent the adversary from knowing that a wireless transmission has occurred.  ...  We found that the random interference in a large-scale wireless network makes the network a "shadow network" to Willie, and can achieve a high spatial throughput. 2) Leveraging on analysis and simulation  ... 
arXiv:1712.05099v3 fatcat:vncsl4r4jbaspddbfqkf7k3ivi

Covert channels in multiplayer first person shooter online games

Sebastian Zander, Grenville Armitage, Philip Branch
2008 2008 33rd IEEE Conference on Local Computer Networks (LCN)  
We empirically analyse the covert channel's bit rate, and compare the statistical characteristics of unmodified game traffic with those of game traffic carrying covert information.  ...  We encode covert bits as slight, yet continuous, variations of a player's character's movements.  ...  ACKNOWLEDGEMENTS We thank Lucas Parry, Lawrence Stewart and Kewin Stoeckigt for being tough opponents in the Q3 tests.  ... 
doi:10.1109/lcn.2008.4664172 dblp:conf/lcn/ZanderAB08 fatcat:h3em7gqrujejjdjb7t5qi5q4oe

Interference Management in 5G and Beyond Network: Requirements, Challenges and Future Directions

Maraj Uddin Ahmed Siddiqui, Faizan Qamar, Faisal Ahmed, Quang Ngoc Nguyen, Rosilah Hassan
2021 IEEE Access  
In the modern technological world, wireless communication has taken a massive leap from the conventional communication system to a new radio communication network.  ...  To provide new insight into interference issue management for the next-generation network, we address and explore various relevant topics in each section that help make the system more robust.  ...  According to the wireless network technologies analysis, the next-generation cellular network is expected to deliver each user with ultrareliable connectivity via multiple devices anywhere and anytime  ... 
doi:10.1109/access.2021.3073543 fatcat:pszxfc6abbg6lkdf2yegsiobfy

Illustrative risks to the public in the use of computer systems and related technology

Peter G. Neumann
1994 Software engineering notes  
free wireless network; great opportunity for launching spam and security attacks (R 21 89) Sf Fingerprint scanner interfaces with built-in wireless LAN network card, defeating intended security (R 21  ...  over a month -despite "security codes" (R 21 39,41) Sh Foolish wireless network access policies provides safe harbor for spam, etc.  ...  Saudi Arabian uses computer to organize harem; it runs him ragged (S 13 2) f Computer error blamed for French diplomatic fiasco (S 13 2) -Computer service selects ex-wife as "ideal" mate for divorced man  ... 
doi:10.1145/181610.181612 fatcat:qfzxpio6tfgl5nmbevta334afi

Illustrative risks to the public in the use of computer systems and related technology

Peter G. Neumann
1996 Software engineering notes  
free wireless network; great opportunity for launching spam and security attacks (R 21 89) Sf Fingerprint scanner interfaces with built-in wireless LAN network card, defeating intended security (R 21  ...  over a month -despite "security codes" (R 21 39,41) Sh Foolish wireless network access policies provides safe harbor for spam, etc.  ...  Saudi Arabian uses computer to organize harem; it runs him ragged (S 13 2) f Computer error blamed for French diplomatic fiasco (S 13 2) -Computer service selects ex-wife as "ideal" mate for divorced man  ... 
doi:10.1145/381790.381797 fatcat:kcxte3luzrg57ms3gwwbqzs5ji

Illustrative risks to the public in the use of computer systems and related technology

Peter G. Neumann
1992 Software engineering notes  
free wireless network; great opportunity for launching spam and security attacks (R 21 89) Sf Fingerprint scanner interfaces with built-in wireless LAN network card, defeating intended security (R 21  ...  over a month -despite "security codes" (R 21 39,41) Sh Foolish wireless network access policies provides safe harbor for spam, etc.  ...  Saudi Arabian uses computer to organize harem; it runs him ragged (S 13 2) f Computer error blamed for French diplomatic fiasco (S 13 2) -Computer service selects ex-wife as "ideal" mate for divorced man  ... 
doi:10.1145/134292.134293 fatcat:ayrwcbvvljhrdeav5kvrxaycs4

Illustrative Risks To The Public In The Use Of Computer Systems And Related Technology

P.G. Neumann
Symposium Record Policy Issues in Information and Communication Technologies in Medical Applications  
free wireless network; great opportunity for launching spam and security attacks (R 21 89) Sf Fingerprint scanner interfaces with built-in wireless LAN network card, defeating intended security (R 21  ...  over a month -despite "security codes" (R 21 39,41) Sh Foolish wireless network access policies provides safe harbor for spam, etc.  ...  Saudi Arabian uses computer to organize harem; it runs him ragged (S 13 2) f Computer error blamed for French diplomatic fiasco (S 13 2) -Computer service selects ex-wife as "ideal" mate for divorced man  ... 
doi:10.1109/ictma.1988.669591 fatcat:wkl3mbqyjbdmfhy4wezuzx4juq