Filters








31,007 Hits in 4.0 sec

An Approach of Covert Communication Based on the Adaptive Steganography Scheme on Voice over IP

Rui Miao, Yongfeng Huang
2011 2011 IEEE International Conference on Communications (ICC)  
Index Terms-Block steganography, adaptive steganography, steganalysis, covert communication I.  ...  Further, the rational tradeoff between hiding requirements and speech quality is also taken into account to construct a practical covert communication system on G.711 VoIP.  ...  The technology of information hiding usually is applied to implement a covert communication system.  ... 
doi:10.1109/icc.2011.5962657 dblp:conf/icc/MiaoH11 fatcat:ygb4wpphqzbdpkmn6cezibzxv4

Incorporating Human Intention into Self-Adaptive Systems

Shihong Huang, Pedro Miranda
2015 2015 IEEE/ACM 37th IEEE International Conference on Software Engineering  
The intelligent ability of these self-adaptive systems is impoverished without knowledge of a user's covert attention (thoughts, emotions, feelings).  ...  Further, systems can self-adapt and refine their behaviors driven by such human covert behavior. The long-term research goal is to incorporate and synergize human neural input.  ...  Emmanuelle Tognoli from the Center for Complex Systems & Brain Sciences at Florida Atlantic University.  ... 
doi:10.1109/icse.2015.196 dblp:conf/icse/HuangM15 fatcat:w6fy5iezrvh5piphsjpzvv6z5q

Slitheen++: Stealth TLS-based Decoy Routing

Benedikt Birtel, Christian Rossow
2020 USENIX Security Symposium  
Slitheen++ overcomes key challenges such as scheduling for covert connections and technologies to more realistically emulate a real user's behavior, such as crawling or delaying overt communication.  ...  of websites from ten covert targets.  ...  The decoy router extracts the censored target from the messages of the tagged flow and redirects all traffic towards the specified "covert" target.  ... 
dblp:conf/uss/BirtelR20 fatcat:rwbeoa52grddbbdm4qiefs4s2m

The executive functions and self-regulation: an evolutionary neuropsychological perspective

R A Barkley
2001 Neuropsychology Review  
injury or developmental impairment toward that system.  ...  Taking the evolutionary stance toward the EFs would achieve not only greater insight into their nature, but also into their assessment and into those larger adaptive capacities that may be diminished through  ...  Yet those adaptive functions would not be evident without taking the evolutionary stance toward the executive system in clinical neuropsychology.  ... 
pmid:11392560 fatcat:tod5lcgsz5frvhbs7yvag6mpvm

In the Eye of the Beholder: Reduced Threat-Bias and Increased Gaze-Imitation towards Reward in Relation to Trait Anger

David Terburg, Henk Aarts, Peter Putman, Jack van Honk, Manos Tsakiris
2012 PLoS ONE  
Evidence from gaze-cueing studies suggests that covert allocation of attention to another individual's gazedirection is facilitated when threat is communicated and further enhanced by trait anxiety.  ...  The gaze of a fearful face silently signals a potential threat's location, while the happy-gaze communicates the location of impending reward.  ...  Introduction Primate and especially human social interaction depend heavily on non-verbal communication with the eyes [1] .  ... 
doi:10.1371/journal.pone.0031373 pmid:22363632 pmcid:PMC3281963 fatcat:snzwlun6zfcwrlu7rynk5geuzm

BRIGHTNESS: Leaking Sensitive Data from Air-Gapped Workstations via Screen Brightness [article]

Mordechai Guri, Dima Bykhovsky, Yuval Elovici
2020 arXiv   pre-print
Air-gapped computers are systems that are kept isolated from the Internet since they store or process sensitive information.  ...  This covert channel is invisible and it works even while the user is working on the computer.  ...  RELATED WORK Leaking data from air-gapped systems via covert communication methods has been explored in the last twenty years.  ... 
arXiv:2002.01078v1 fatcat:73egbp5efzbr7iqc4vp5stua3u

2021 Index IEEE Open Journal of the Computer Society Vol. 2

2021 IEEE Open Journal of the Computer Society  
., +, OJCS 2021 241-259 Microorganisms Toward Agile Information and Communication Framework for the Post-COVID-19 Era.  ...  Chen, R., +, OJCS 2021 308-320 Toward Agile Information and Communication Framework for the Post-COVID-19 Era.  ... 
doi:10.1109/ojcs.2022.3141950 fatcat:l2abkosddfg3tezjk6b7psunyq

Hiding Information in Noise: Fundamental Limits of Covert Wireless Communication [article]

Boulat A. Bash and Dennis Goeckel and Saikat Guha and Don Towsley
2015 arXiv   pre-print
After reviewing these covert communication systems, this article discusses new results on the fundamental limits of their capabilities, as well as provides a vision for the future of such systems.  ...  Various covert communication techniques were developed to address these concerns, including steganography for finite-alphabet noiseless applications and spread-spectrum systems for wireless communications  ...  The first step towards this goal is extending the covert communication scenario of this article to point-to-point jammer-assisted covert communication in the presence of multiple wardens.  ... 
arXiv:1506.00066v1 fatcat:u3y7mtpguzfgrk73v3bgmx5buy

Behavioral Mimicry Covert Communication [chapter]

Seyed Ali Ahmadzadeh, Gordon Agnew
2012 Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering  
However, thwarting covert channels may be costly as it moves the system toward the total isolation strategy (e.g., one CPU should be dedicated to each service).  ...  This adaptive behavior proves to be crucial in making an undetectable and stealth covert communication scheme.  ... 
doi:10.1007/978-3-642-31909-9_8 fatcat:uz5vx5lvzvh2vfqmcpnk2gnqza

Neural Population Dynamics Underlying Motor Learning Transfer

Saurabh Vyas, Nir Even-Chen, Sergey D. Stavisky, Stephen I. Ryu, Paul Nuyujukian, Krishna V. Shenoy
2018 Neuron  
We found that covert and overt contexts share these initial conditions, and covert rehearsal manipulates them in a manner that persists across context changes thus facilitating overt motor learning.  ...  This transfer learning mechanism might provide new insights into other covert processes like mental rehearsal.  ...  These results demonstrate that: (i) Adaptation to the VMR systematically changes motor preparatory activity towards a pattern known to prepare movements angled away from the VMR.  ... 
doi:10.1016/j.neuron.2018.01.040 pmid:29456026 pmcid:PMC5843544 fatcat:6tququairvcajp5szzqgqwnxem

Covert Quantum Internet [article]

Kamil Bradler, George Siopsis, Alex Wozniakowski
2017 arXiv   pre-print
We apply covert quantum communication based on entanglement generated from the Minkowski vacuum to the setting of quantum computation and quantum networks.  ...  We devise a suite of covert quantum teleportation protocols that utilize the shared entanglement, local operations, and covert classical communication to transfer or process quantum information in stealth  ...  The scheme for the covert teleportation of quantum states is adaptable to the variants of the protocol that teleport quantum gates.  ... 
arXiv:1704.07281v1 fatcat:3chynudb4jaifdthr3feg4smo4

Aerial Intelligent Reflecting Surface Enabled Terahertz Covert Communications in Beyond-5G Internet of Things [article]

Milad Tatar Mamaghani, Yi Hong
2022 arXiv   pre-print
In this paper, we propose a UAV-mounted IRS (UIRS) communication system over THz bands for confidential data dissemination from an access point (AP) towards multiple ground user equipments (UEs) in IoT  ...  To protect information messages and the privacy of the scheduled UE, we aim to devise an energy-efficient multi-UAV covert communication scheme, where the UIRS is for reliable data transmissions, and an  ...  II MULTI-UAV COVERT COMMUNICATION SYSTEM MODEL AND PROBLEM FORMULATION A Multi-UAV Covert Communication System We consider a THz-supported wireless communication system as illustrated in Fig. 1 , where  ... 
arXiv:2111.11650v2 fatcat:eczkicu7pnbq5plzrngmyiveye

The Threat of Covert Channels in Network Time Synchronisation Protocols

Kevin Lamshöft, Jonas Hielscher, Christian Krätzer, Jana Dittmann
2022 Journal of Cyber Security and Mobility  
Synchronized clocks are vital for most communication scenarios in networks of Information Technology (IT) and Operational Technology (OT).  ...  For NTP we perform a systematic in-depth analysis of covert channels. Our analysis results in the identification of 49 covert channels, by applying a covert channel pattern-based taxonomy.  ...  As shown in 5, the next steps (3, 4, 5, 6) cover the distribution towards the targeted system within this network.  ... 
doi:10.13052/jcsm2245-1439.1123 fatcat:fz232ucocncbhgrxadvv4a64pm

Page 275 of The Canadian Review of Sociology Vol. 7, Issue 4 [page]

1970 The Canadian Review of Sociology  
advance or retard individuals’ capacity to strive toward economic success in various systems.  ...  Networks are discernible lines of linkages in an exchange system and com- munication mechanisms are linkages in such a system.  ... 

Educational dropout in Israel – general progress in the last decade

Usama Heib, PhD Candidate, West University of Timisoara, Theofild Lazăr, Associate Professor, West University of Timisoara
2020 Journal of Educational Sciences  
The data reveals that, even if there is progress in preventing educational dropout in both systems, the Arabic system registers significantly higher rates that the Hebrew educational system.  ...  Moreover, dropping out of the education system may have a significant impact on the mental and economic well-being of young generations of citizens.  ...  Negative attitudes toward school are among the aspects that characterize covert dropouts.  ... 
doi:10.35923/jes.2020.1.05 fatcat:75djydzyvfaibjd7mskaxkms7a
« Previous Showing results 1 — 15 out of 31,007 results