Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Filters








197 Hits in 6.4 sec

Designing Rich-Secure Network Covert Timing Channels Based on Nested Lattices

2019 KSII Transactions on Internet and Information Systems  
Experimental results on real traffic show that the proposed schemes are rich-secure, and robust to channel interference, whereas some state-of-the-art covert timing channels cannot evade detection under  ...  In this study, a rich security model of covert timing channels is established based on IPD chains, which can be used to measure the distortion of multi-order timing statistics of a covert timing channel  ...  Furthermore, trellis-based adaptive modulation [17] and analog fountain timing channels [6] are proposed to achieve the tradeoff between robustness and undetectability.  ... 
doi:10.3837/tiis.2019.04.007 fatcat:kyj7y27mbran3frbjnkdzsxxpy

An asynchronous covert channel using spam

Aniello Castiglione, Alfredo De Santis, Ugo Fiore, Francesco Palmieri
2012 Computers and Mathematics with Applications  
Current Internet e-mail facilities are built onto the foundation of standard rules and protocols, which usually allow a considerable amount of "freedom" to their designers.  ...  Thus, a lot of optional and redundant information is being exchanged during e-mail sessions, which is available to implement versatile covert channel mechanisms.  ...  Based on the analogy with fountains, these codes allow the reconstruction of the transmitted object by assembling digital droplets.  ... 
doi:10.1016/j.camwa.2011.07.068 fatcat:irr6mavk55fdfb62cmeorn56au

An Opportunistic Error Correction Layer for OFDM Systems

Xiaoying Shao, Roel Schiphorst, Cornelis H. Slump
2009 EURASIP Journal on Wireless Communications and Networking  
Our scheme is based on resolution-adaptive ADCs and Fountain codes. In a wireless frequency-selective channel some subcarriers have good channel conditions and others are attenuated.  ...  To reduce the overhead of Fountain codes, we apply message passing and Gaussian elimination in the decoder. In this way, the overhead is 3% for a small block size (i.e., 500 packets).  ...  In this paper, we investigate a novel error-correction layer based on Fountain codes, orthogonal frequency-division multiplexing (OFDM), and adaptive analog-to-digital conversion to mitigate the effects  ... 
doi:10.1155/2009/750735 fatcat:vqovdluli5h6thy6atbqjpflde

Behavioral Mimicry Covert Communication [chapter]

Seyed Ali Ahmadzadeh, Gordon Agnew
2012 Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering  
Inspired by the challenges of designing robust, undetectable, and high rate covert channels over public communication networks, in this chapter a new design methodology for provably undetectable timing  ...  This is analogous to the concept of adaptive coding and modulation in digital communication [103] .  ... 
doi:10.1007/978-3-642-31909-9_8 fatcat:uz5vx5lvzvh2vfqmcpnk2gnqza

On the robustness of three classes of rateless codes against pollution attacks in P2P networks

Rossano Gaeta, Marco Grangetto
2021 Peer-to-Peer Networking and Applications  
AbstractRateless codes (a.k.a. fountain codes, digital fountain) have found their way in numerous peer-to-peer based applications although their robustness to the so called pollution attack has not been  ...  to the victim selection and type of alteration of chosen equations and exhibit virtually identical robustness although BC offer a low complexity of the decoding algorithm.  ...  Such an approach was also termed digital fountain or fountain codes [32] , the most well known designs being the Luby Transform (LT) [30] and raptor codes [41] .  ... 
doi:10.1007/s12083-021-01206-2 fatcat:ix5vhoqobfec5pnouk7njeixva

Background Subtraction for Automated Multisensor Surveillance: A Comprehensive Review

Marco Cristani, Michela Farenzena, Domenico Bloisi, Vittorio Murino
2010 EURASIP Journal on Advances in Signal Processing  
In this paper, we propose a comprehensive review of the background subtraction methods, that considers also channels other than the sole visible optical one (such as the audio and the infrared channels  ...  There are several problems related to this task, mainly due to the blurred boundaries between background and foreground definitions.  ...  The authors build a multimodal model of the scene background, in which both the audio and the video are modeled by employing a time-adaptive mixture model.  ... 
doi:10.1155/2010/343057 fatcat:yyz6764u3nf3jcoik3bmgeltlm

Atomic fountain clocks

R Wynands, S Weyers
2005 Metrologia  
We describe and review the current state of the art in atomic fountain clocks.  ...  Acknowledgement We thank our colleagues in Paris for making available the data for Figs. 11, 12, and 13. We thank A. Bauch, C. O. Weiß, and F. Riehle for a critical reading of the manuscript.  ...  atom number per detection channel.  ... 
doi:10.1088/0026-1394/42/3/s08 fatcat:2hflijragbfsza4nvmd3qboo3i

Low-Density Parity-Check Codes and Their Rateless Relatives

Nicholas Bonello, Sheng Chen, Lajos Hanzo
2011 IEEE Communications Surveys and Tutorials  
In doing so, we will identify the most important milestones that have occurred since their conception until the current era and elucidate the related design problems and their respective solutions.  ...  This survey guides the reader through the extensive open literature that is covering the family of low-density paritycheck (LDPC) codes and their rateless relatives.  ...  However, it was shown in [290] that a degree distribution designed for rateless coded transmissions over time-varying noisy channels will depend on the underlying channel characteristics, and therefore  ... 
doi:10.1109/surv.2011.040410.00042 fatcat:l6hrbfv3zvf6tpe37h7lhpeuoi

Defense Advanced Research Projects Agency (Darpa) Fiscal Year 2015 Budget Estimates

Department Of Defense Comptroller's Office
2014 Zenodo  
DARPA seeks to improve the analysis of large neural data sets by creating interfaces that will allow researchers to generate new models across multiple scales.  ...  advanced control and sensory functions.  ...  This has led to the development of high-performance laboratory-based cold-atom fountain clocks, such as the U.S. national time standard, NIST-F1, and the rubidium fountains that underpin the U. S.  ... 
doi:10.5281/zenodo.1215345 fatcat:fjzhmynqjbaafk67q2ckcblj2m

Survey on Cryptocurrency Networking: Context, State-of-the-Art, Challenges [article]

Maya Dotan, Yvonne-Anne Pignolet, Stefan Schmid, Saar Tochner, Aviv Zohar
2020 arXiv   pre-print
This paper is motivated by these differences, and in particular by the observation that many fundamental design aspects of these networks are not well-understood today.  ...  Cryptocurrencies such as Bitcoin are realized using distributed systems and hence critically rely on the performance and security of the interconnecting network.  ...  Analogously, operations with multiple senders and receivers are typically supported.  ... 
arXiv:2008.08412v1 fatcat:ishzj43g2fhibadqj2g3akfxgi

Threat Defense: Cyber Deception Approach and Education for Resilience in Hybrid Threats Model

William Steingartner, Darko Galinec, Andrija Kozina
2021 Symmetry  
This paper aims to explore the cyber-deception-based approach and to design a novel conceptual model of hybrid threats that includes deception methods.  ...  These reactive defenses are designed to detect once they are attacked yet often fail.  ...  In a time of change and adaptation, upcoming cybersecurity challenges, and guidance on how to prepare for them are to be explored" [20] .  ... 
doi:10.3390/sym13040597 fatcat:6thxnfbz4zf7jhi4lnenghqiqq

Enhancing the durational enhancement of a tone contrast

Carlos Gussenhoven
2006 Journal of the Acoustical Society of America  
loudness model: Design principles and predictions.  ...  The work is also useful in active control system design. 8:30 2aSP3. Adaptive filtering algoritm for time-variant symmetric ␣-stable signals.  ...  In this paper, a newly developed and tested time domain model for acoustic scattering from moving 2-D surfaces ͓J. Acoust. Soc.  ... 
doi:10.1121/1.4786135 fatcat:7wt7lq7gmfbk5mbm3fxedjriaa

Quantum control of molecules for fundamental physics

D. Mitra, K. H. Leung, T. Zelevinsky
2022 Physical Review A  
Not only are molecules ubiquitous in nature, but the control of their quantum states offers unparalleled access to fundamental constants and possible physics beyond the Standard Model.  ...  At the same time, their complex internal structure presents experimental challenges to overcome in order to gain sensitivity to new physics.  ...  and collision models [214, 215] .  ... 
doi:10.1103/physreva.105.040101 fatcat:s44xcpiftrbzvc56g2lc24xeum

FIRE-2 simulations: physics versus numerics in galaxy formation

Philip F Hopkins, Andrew Wetzel, Dušan Kereš, Claude-André Faucher-Giguère, Eliot Quataert, Michael Boylan-Kolchin, Norman Murray, Christopher C Hayward, Shea Garrison-Kimmel, Cameron Hummels, Robert Feldmann, Paul Torrey (+16 others)
2018 Monthly notices of the Royal Astronomical Society  
Most galaxy-scale properties are robust to numerics we test, provided: (1) Toomre masses are resolved; (2) feedback coupling ensures conservation, and (3) individual supernovae are time-resolved.  ...  Stellar masses and profiles are most robust to resolution, followed by metal abundances and morphologies, followed by properties of winds and circum-galactic media (CGM).  ...  that generate fountains and superwinds (e.g.  ... 
doi:10.1093/mnras/sty1690 fatcat:5iuteqv3yfbspfdzjbalajzd7a

Identity Document and banknote security forensics: a survey [article]

Albert Berenguel Centeno, Oriol Ramos Terrades, Josep Lladós Canet, Cristina Cañero Morales
2019 arXiv   pre-print
Counterfeiting and piracy are a form of theft that has been steadily growing in recent years. Banknotes and identity documents are two common objects of counterfeiting.  ...  Other topics, such as history of counterfeiting, effects on society and document experts, counterfeiter types of attacks, trends among others are covered.  ...  The security features are designed to resist deterioration for reasonable wear and tear and robust to forgery.  ... 
arXiv:1910.08993v1 fatcat:6onl6iprozbm3m7r3rea6xlnfq
« Previous Showing results 1 — 15 out of 197 results