A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2020; you can also visit the original URL.
The file type is application/pdf
.
Filters
Designing Rich-Secure Network Covert Timing Channels Based on Nested Lattices
2019
KSII Transactions on Internet and Information Systems
Experimental results on real traffic show that the proposed schemes are rich-secure, and robust to channel interference, whereas some state-of-the-art covert timing channels cannot evade detection under ...
In this study, a rich security model of covert timing channels is established based on IPD chains, which can be used to measure the distortion of multi-order timing statistics of a covert timing channel ...
Furthermore, trellis-based adaptive modulation [17] and analog fountain timing channels [6] are proposed to achieve the tradeoff between robustness and undetectability. ...
doi:10.3837/tiis.2019.04.007
fatcat:kyj7y27mbran3frbjnkdzsxxpy
An asynchronous covert channel using spam
2012
Computers and Mathematics with Applications
Current Internet e-mail facilities are built onto the foundation of standard rules and protocols, which usually allow a considerable amount of "freedom" to their designers. ...
Thus, a lot of optional and redundant information is being exchanged during e-mail sessions, which is available to implement versatile covert channel mechanisms. ...
Based on the analogy with fountains, these codes allow the reconstruction of the transmitted object by assembling digital droplets. ...
doi:10.1016/j.camwa.2011.07.068
fatcat:irr6mavk55fdfb62cmeorn56au
An Opportunistic Error Correction Layer for OFDM Systems
2009
EURASIP Journal on Wireless Communications and Networking
Our scheme is based on resolution-adaptive ADCs and Fountain codes. In a wireless frequency-selective channel some subcarriers have good channel conditions and others are attenuated. ...
To reduce the overhead of Fountain codes, we apply message passing and Gaussian elimination in the decoder. In this way, the overhead is 3% for a small block size (i.e., 500 packets). ...
In this paper, we investigate a novel error-correction layer based on Fountain codes, orthogonal frequency-division multiplexing (OFDM), and adaptive analog-to-digital conversion to mitigate the effects ...
doi:10.1155/2009/750735
fatcat:vqovdluli5h6thy6atbqjpflde
Behavioral Mimicry Covert Communication
[chapter]
2012
Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
Inspired by the challenges of designing robust, undetectable, and high rate covert channels over public communication networks, in this chapter a new design methodology for provably undetectable timing ...
This is analogous to the concept of adaptive coding and modulation in digital communication [103] . ...
doi:10.1007/978-3-642-31909-9_8
fatcat:uz5vx5lvzvh2vfqmcpnk2gnqza
On the robustness of three classes of rateless codes against pollution attacks in P2P networks
2021
Peer-to-Peer Networking and Applications
AbstractRateless codes (a.k.a. fountain codes, digital fountain) have found their way in numerous peer-to-peer based applications although their robustness to the so called pollution attack has not been ...
to the victim selection and type of alteration of chosen equations and exhibit virtually identical robustness although BC offer a low complexity of the decoding algorithm. ...
Such an approach was also termed digital fountain or fountain codes [32] , the most well known designs being the Luby Transform (LT) [30] and raptor codes [41] . ...
doi:10.1007/s12083-021-01206-2
fatcat:ix5vhoqobfec5pnouk7njeixva
Background Subtraction for Automated Multisensor Surveillance: A Comprehensive Review
2010
EURASIP Journal on Advances in Signal Processing
In this paper, we propose a comprehensive review of the background subtraction methods, that considers also channels other than the sole visible optical one (such as the audio and the infrared channels ...
There are several problems related to this task, mainly due to the blurred boundaries between background and foreground definitions. ...
The authors build a multimodal model of the scene background, in which both the audio and the video are modeled by employing a time-adaptive mixture model. ...
doi:10.1155/2010/343057
fatcat:yyz6764u3nf3jcoik3bmgeltlm
Atomic fountain clocks
2005
Metrologia
We describe and review the current state of the art in atomic fountain clocks. ...
Acknowledgement We thank our colleagues in Paris for making available the data for Figs. 11, 12, and 13. We thank A. Bauch, C. O. Weiß, and F. Riehle for a critical reading of the manuscript. ...
atom number per detection channel. ...
doi:10.1088/0026-1394/42/3/s08
fatcat:2hflijragbfsza4nvmd3qboo3i
Low-Density Parity-Check Codes and Their Rateless Relatives
2011
IEEE Communications Surveys and Tutorials
In doing so, we will identify the most important milestones that have occurred since their conception until the current era and elucidate the related design problems and their respective solutions. ...
This survey guides the reader through the extensive open literature that is covering the family of low-density paritycheck (LDPC) codes and their rateless relatives. ...
However, it was shown in [290] that a degree distribution designed for rateless coded transmissions over time-varying noisy channels will depend on the underlying channel characteristics, and therefore ...
doi:10.1109/surv.2011.040410.00042
fatcat:l6hrbfv3zvf6tpe37h7lhpeuoi
Defense Advanced Research Projects Agency (Darpa) Fiscal Year 2015 Budget Estimates
2014
Zenodo
DARPA seeks to improve the analysis of large neural data sets by creating interfaces that will allow researchers to generate new models across multiple scales. ...
advanced control and sensory functions. ...
This has led to the development of high-performance laboratory-based cold-atom fountain clocks, such as the U.S. national time standard, NIST-F1, and the rubidium fountains that underpin the U. S. ...
doi:10.5281/zenodo.1215345
fatcat:fjzhmynqjbaafk67q2ckcblj2m
Survey on Cryptocurrency Networking: Context, State-of-the-Art, Challenges
[article]
2020
arXiv
pre-print
This paper is motivated by these differences, and in particular by the observation that many fundamental design aspects of these networks are not well-understood today. ...
Cryptocurrencies such as Bitcoin are realized using distributed systems and hence critically rely on the performance and security of the interconnecting network. ...
Analogously, operations with multiple senders and receivers are typically supported. ...
arXiv:2008.08412v1
fatcat:ishzj43g2fhibadqj2g3akfxgi
Threat Defense: Cyber Deception Approach and Education for Resilience in Hybrid Threats Model
2021
Symmetry
This paper aims to explore the cyber-deception-based approach and to design a novel conceptual model of hybrid threats that includes deception methods. ...
These reactive defenses are designed to detect once they are attacked yet often fail. ...
In a time of change and adaptation, upcoming cybersecurity challenges, and guidance on how to prepare for them are to be explored" [20] . ...
doi:10.3390/sym13040597
fatcat:6thxnfbz4zf7jhi4lnenghqiqq
Enhancing the durational enhancement of a tone contrast
2006
Journal of the Acoustical Society of America
loudness model: Design principles and predictions. ...
The work is also useful in active control system design.
8:30 2aSP3. Adaptive filtering algoritm for time-variant symmetric ␣-stable signals. ...
In this paper, a newly developed and tested time domain model for acoustic scattering from moving 2-D surfaces ͓J. Acoust. Soc. ...
doi:10.1121/1.4786135
fatcat:7wt7lq7gmfbk5mbm3fxedjriaa
Quantum control of molecules for fundamental physics
2022
Physical Review A
Not only are molecules ubiquitous in nature, but the control of their quantum states offers unparalleled access to fundamental constants and possible physics beyond the Standard Model. ...
At the same time, their complex internal structure presents experimental challenges to overcome in order to gain sensitivity to new physics. ...
and collision models [214, 215] . ...
doi:10.1103/physreva.105.040101
fatcat:s44xcpiftrbzvc56g2lc24xeum
FIRE-2 simulations: physics versus numerics in galaxy formation
2018
Monthly notices of the Royal Astronomical Society
Most galaxy-scale properties are robust to numerics we test, provided: (1) Toomre masses are resolved; (2) feedback coupling ensures conservation, and (3) individual supernovae are time-resolved. ...
Stellar masses and profiles are most robust to resolution, followed by metal abundances and morphologies, followed by properties of winds and circum-galactic media (CGM). ...
that generate fountains and superwinds (e.g. ...
doi:10.1093/mnras/sty1690
fatcat:5iuteqv3yfbspfdzjbalajzd7a
Identity Document and banknote security forensics: a survey
[article]
2019
arXiv
pre-print
Counterfeiting and piracy are a form of theft that has been steadily growing in recent years. Banknotes and identity documents are two common objects of counterfeiting. ...
Other topics, such as history of counterfeiting, effects on society and document experts, counterfeiter types of attacks, trends among others are covered. ...
The security features are designed to resist deterioration for reasonable wear and tear and robust to forgery. ...
arXiv:1910.08993v1
fatcat:6onl6iprozbm3m7r3rea6xlnfq
« Previous
Showing results 1 — 15 out of 197 results