Filters








15 Hits in 11.1 sec

Hidden and Uncontrolled - On the Emergence of Network Steganographic Threats [article]

Steffen Wendzel, Wojciech Mazurczyk, Luca Caviglione, Michael Meier
2014 arXiv   pre-print
We discuss the issues related to countering network steganography in practice and provide an outlook on further research directions and problems.  ...  Network steganography is the art of hiding secret information within innocent network transmissions. Recent findings indicate that novel malware is increasingly using network steganography.  ...  Thirdly, we predict the emergence of network steganography to new domains, especially when combined with existing malware.  ... 
arXiv:1407.2029v1 fatcat:5lxmcprh6zf4fd6a5csuqv53oq

Analysis of Reversible Network Covert Channels

Przemyslaw Szary, Wojciech Mazurczyk, Steffen Wendzel, Luca Caviglione
2022 IEEE Access  
Unfortunately, the most recent evolution of information-hiding-capable threats enjoys reversible properties, i.e., the abused network flow is restored to its original form.  ...  The results confirm that reversibility can be used in various network conditions and is not impaired by middleboxes.  ...  Alas, the major utilization of hidden network communications regards empowering malware and advanced persistent threats with the ability of exchanging commands, move stolen data, and drop a payload beyond  ... 
doi:10.1109/access.2022.3168018 fatcat:nlbvdyblkrgzpcyo6ujfg33oee

Survey on Security Issues in Cloud Computing and Associated Mitigation Techniques

Rohit Bhadauria, Sugata Sanyal
2012 International Journal of Computer Applications  
Also, one can never deny the possibility of a server breakdown that has been witnessed, rather quite often in the recent times.  ...  In a cloud computing environment, the entire data reside over a set of networked resources, enabling the data to be accessed through virtual machines.  ...  ACKNOWLEDGEMENTS The authors are extremely thankful to Nabendu Chaki, Rituparna Chaki and Chandrakant Sakharwade for their invaluable suggestions towards the improvement of the paper.  ... 
doi:10.5120/7292-0578 fatcat:yt6coxs3m5fonpnny6vcjnv3jy

Digital Forensic Analysis [chapter]

2016 Policing Digital Crime  
Castells argues that 'technology is a necessary, albeit not sufficient condition for the emergence of a new form of social organization based on networking, that is on the diffusion of networking in all  ...  an overwhelming and uncontrollable urge to steal.  ... 
doi:10.4324/9781315601083-14 fatcat:dfcfbcyqfjdkphuarpuks7qxjq

Illustrative risks to the public in the use of computer systems and related technology

Peter G. Neumann
1994 Software engineering notes  
Piracy and proprietary software rights: $dP Microsoft documents leaked on the perceived threats of open-source software, (S 12 1) SH Dan Farmer's security survey [2Jan1997] catalogs attacks on government  ...  Whereas the emphasis in the following list is on problems rather than on would-be solutions, the pervasive nature of the problems suggests that techniques for the effective development and operation of  ...  ef$ Water company software upgrade results in monster water bill and threats of penalties and interest (R 20 12) f British Gas blames SW for sending 15,000 customers false warnings (S 19 2:4) $f Marks&  ... 
doi:10.1145/181610.181612 fatcat:qfzxpio6tfgl5nmbevta334afi

Illustrative risks to the public in the use of computer systems and related technology

Peter G. Neumann
1992 Software engineering notes  
Piracy and proprietary software rights: $dP Microsoft documents leaked on the perceived threats of open-source software, (S 12 1) SH Dan Farmer's security survey [2Jan1997] catalogs attacks on government  ...  Whereas the emphasis in the following list is on problems rather than on would-be solutions, the pervasive nature of the problems suggests that techniques for the effective development and operation of  ...  ef$ Water company software upgrade results in monster water bill and threats of penalties and interest (R 20 12) f British Gas blames SW for sending 15,000 customers false warnings (S 19 2:4) $f Marks&  ... 
doi:10.1145/134292.134293 fatcat:ayrwcbvvljhrdeav5kvrxaycs4

Illustrative risks to the public in the use of computer systems and related technology

Peter G. Neumann
1996 Software engineering notes  
Piracy and proprietary software rights: $dP Microsoft documents leaked on the perceived threats of open-source software, (S 12 1) SH Dan Farmer's security survey [2Jan1997] catalogs attacks on government  ...  Whereas the emphasis in the following list is on problems rather than on would-be solutions, the pervasive nature of the problems suggests that techniques for the effective development and operation of  ...  ef$ Water company software upgrade results in monster water bill and threats of penalties and interest (R 20 12) f British Gas blames SW for sending 15,000 customers false warnings (S 19 2:4) $f Marks&  ... 
doi:10.1145/381790.381797 fatcat:kcxte3luzrg57ms3gwwbqzs5ji

Online) International Journal of Network Security is published both in traditional paper form

Min-Shiang Hwang, Shu-Fen Chiou, Chia-Chun Wu, Cheng-Yi Yang, Ajith Abraham, Korea, Wael Adi, Iqbal Sheikh, Ahamed, Vijay Atluri, Mauro Barni, Andrew Blyth (+97 others)
2016 International Journal of Network Security   unpublished
Then a new PPS authenticated key agreement protocol is given based on chaotic maps. Security of the scheme is based on chaotic maps hard problems and a secure one way hash function.  ...  So, the paper will wipe out the symmetric cryptography , and only use chaotic maps, a secure one-way hash function to construct a provable privacy-protection system (PPS) which can achieve two kinds of  ...  Acknowledgments The paper has been supported by Natural Science Foundation of China under No.61003300 and 61272074, and Natural Science Foundation of Jiangsu Province under No.BK2011464.  ... 
fatcat:3gborlznmrac3ebiwzxjjy5jly

Interception: law, media, and techniques

Bernard Keenan, Alain Pottage, Conor Gearty
2018
Interception is presented as an effect of different sets of technical operations, mediated and processed by communication devices and networks.  ...  In 2013, Edward Snowden provided journalists with copies of classified documents detailing the operations of the National Security Agency of the United States and its allies; in particular, the UK's Government  ...  , CCTV, telephotography, the use of hidden tracking devices, and so on.  ... 
doi:10.21953/lse.2zy5g8eu34il fatcat:dmtvlcv4wreyzpljfq66fx7hjq

Online) International Journal of Network Security is published both in traditional paper form

Min-Shiang Hwang, Shu-Fen Chiou, Chia-Chun Wu, Cheng-Yi Yang, Ajith Abraham, Korea, Wael Adi, Iqbal Sheikh, Ahamed, Vijay Atluri, Mauro Barni, Andrew Blyth (+102 others)
2016 International Journal of Network Security   unpublished
The success of these attacks on the proposed mechanism dependence on trust score: lesser trust score (≤ 50) increases the chances of these attacks whereas higher trust score protects the network from these  ...  attacks and improves the network performance as well.  ...  Acknowledgments This study was supported by CEREP Research laboratory in College of Sciences and techniques in Tunisia.  ... 
fatcat:ez6kvrzkuzg75nulaxycvfvxcq

Hacktivism and Habermas: Online Protest as Neo-Habermasian Counterpublicity [article]

Tessa J. Houghton, University Of Canterbury
2011
This theoretical framework is then mobilised through a critical discourse analytical approach, exploring three cases of hacktivist counterpublicity, and revealing the emergence of a multivalent, multimodal  ...  The analysis focuses on how the discursive form and content of hacktivism combines to function counterhegemonically; that is, how hacktivists work to provoke widespread political preference reflection  ...  "hidden meanings and value structures" (Jaworski & Coupland 1999: 33) .  ... 
doi:10.26021/4788 fatcat:mqxmsovo6zeqhdntw6g3he2wum

Illustrative Risks To The Public In The Use Of Computer Systems And Related Technology

P.G. Neumann
Symposium Record Policy Issues in Information and Communication Technologies in Medical Applications  
Piracy and proprietary software rights: $dP Microsoft documents leaked on the perceived threats of open-source software, (S 12 1) SH Dan Farmer's security survey [2Jan1997] catalogs attacks on government  ...  Whereas the emphasis in the following list is on problems rather than on would-be solutions, the pervasive nature of the problems suggests that techniques for the effective development and operation of  ...  ef$ Water company software upgrade results in monster water bill and threats of penalties and interest (R 20 12) f British Gas blames SW for sending 15,000 customers false warnings (S 19 2:4) $f Marks&  ... 
doi:10.1109/ictma.1988.669591 fatcat:wkl3mbqyjbdmfhy4wezuzx4juq

Arcana Imperii: Roman political intelligence, counterintelligence, and covert action in the Mid-Republic [article]

Sara Perley, University, The Australian National, University, The Australian National
2017
There are no studies that focus specifically on political intelligence, and none that focuses on a specific period of Roman history.  ...  This study aims to illuminate the realities of Roman political intelligence for the period of the mid-republic, and attempts to provide a more nuanced understanding of Rome's appreciation for and use of  ...  Without a source of information about Jugurtha's activity, there was no way of tracking his plans and the threat he posed to Roman arrangements in Africa. value in Roman intelligence networks.  ... 
doi:10.25911/5d74e789247f0 fatcat:vfkck7bv4bbv5acztcsh55ejf4

Imagined worlds: the role of dreams, space and the supernatural in the evolution of Victorian fantasy

Kirstin Ann Mills
2022
It does so by focusing on a large group of British authors who wrote on dreams, space and the supernatural, including Walpole, Coleridge, De Quincey, Kingsley, MacDonald and Morris.  ...  Victorian enquiries into the nature of dreams, the mind and the supernatural can be seen as investigations into alternative spaces of existence: realms and worlds beyond those of traditional three-dimensional  ...  hidden behind the world of material reality' (32-3).  ... 
doi:10.25949/19427840 fatcat:ifw3ghz3u5ditowsnjgpyjyfm4

Variations and application conditions of the data type "Image" - the foundation of computational visualistics [article]

Jörg R. J. Schirra, Universitäts- Und Landesbibliothek Sachsen-Anhalt, Martin-Luther Universität
2018
Not all of the details present may be integrated on first view.  ...  Like any picture, a map -and hence this book -is a context builder: it allows the readers to explore different paths in an abstract region, to connect many landmarks on several ways, and to establish their  ...  self and other, both alone and networked.  ... 
doi:10.25673/4643 fatcat:7ugo5xyafjc4ze6on7y2mpjt7m