Zobrazeno 1 - 10
of 3 646
pro vyhledávání: '"Covert Channel"'
Publikováno v:
Journal of Universal Computer Science, Vol 30, Iss 8, Pp 1048-1067 (2024)
With the advent of the Internet-of-Things, sensor data streams are widespread and thus a promising target for network steganography including covert channels. Therefore, we present an approach where the covert sender and receiver first build an archi
Externí odkaz:
https://doaj.org/article/4603ac17ce684126ab1f10a48994358d
Publikováno v:
Jisuanji kexue yu tansuo, Vol 18, Iss 6, Pp 1438-1456 (2024)
Covert channel is a method to hide information in public communication channels for covert transmission, aiming at ensuring data transmission security and making third parties unaware of the covert communication process. However, with the continuous
Externí odkaz:
https://doaj.org/article/272a678b7f8d4c8c9037300478e87de3
Publikováno v:
IEEE Access, Vol 12, Pp 36515-36522 (2024)
A covert communication channel facilitates direct data transfer between two parties through pre-communication knowledge agreements, ensuring secure and confidential transmission of information. However, the existing covert channels suffer from perfor
Externí odkaz:
https://doaj.org/article/ac81b0793f98480d937cc7e7b0a4d9c5
Publikováno v:
Applied Sciences, Vol 14, Iss 15, p 6699 (2024)
With advancements in chip technology, the number of cores in modern commercial processors continues to rise, leading to increased complexity in interconnects and on-chip networks. This complexity, however, exposes significant security vulnerabilities
Externí odkaz:
https://doaj.org/article/18336213e9c74aa88ade18e2e43aa140
Autor:
Geovani Teca, Marek Natkaniec
Publikováno v:
International Journal of Electronics and Telecommunications, Vol vol. 69, Iss No 2, Pp 293-299 (2023)
Wireless Local Area Networks present several vulnerabilities that are exploited, and as a result, numerous attacks have been developed and used against them. Although countermeasures to detect and eliminate such threats have been created throughout t
Externí odkaz:
https://doaj.org/article/5bf84d3070fc4936bd7afce07787cfb2
Autor:
Marek Natkaniec, Jakub Dyrcz
Publikováno v:
Energies, Vol 17, Iss 9, p 2021 (2024)
Wi-Fi networks within the smart grid play a vital role in enabling communication between smart meters and data collectors. They are also frequently used in automation and metering, distribution control and monitoring, and distribution protection. How
Externí odkaz:
https://doaj.org/article/e23219fe3d1447eeb3534752b57d7103
Publikováno v:
International Journal of Intelligent Networks, Vol 4, Iss , Pp 337-348 (2023)
Privacy and security issues concerning mobile devices have substantial consequences for individuals, groups, governments, and businesses. The Android operating system bolsters smartphone data protection by imposing restrictions on app behavior. Never
Externí odkaz:
https://doaj.org/article/d66d3326c8ea481b921fa61fa3f7f0a2
Publikováno v:
Tongxin xuebao, Vol 43, Pp 186-201 (2022)
In the ubiquitous network environment, covert channel bypasses the system’s security strategy to transmit covert information by modifying the system’s shared resources, which poses a serious security threat to the computer and network system.The
Externí odkaz:
https://doaj.org/article/6cd8b741cdb84eb09b00f2e0398d2e95
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Autor:
Geovani Teca, Marek Natkaniec
Publikováno v:
Energies, Vol 17, Iss 3, p 716 (2024)
A smart grid constitutes an electrical infrastructure that integrates communication technologies to optimize electricity production, distribution, and consumption. Within the smart grid, IEEE 802.11 networks play a crucial role in facilitating commun
Externí odkaz:
https://doaj.org/article/5232c7c3d2534e2090ced3f0ed7608be