57   Artículos

 
en línea
Valentin Martinoli, Elouan Tourneur, Yannick Teglia and Régis Leveugle    
In this work, we study an end-to-end implementation of a Prime + Probe covert channel on the CVA6 RISC-V processor implemented on a FPGA target and running a Linux OS. We develop the building blocks of the covert channel and provide a detailed view of it... ver más
Revista: Journal of Low Power Electronics and Applications    Formato: Electrónico

 
en línea
Huiyuan Wang, Xiaojun Wu, Zirui Wang, Yukun Hao, Chengpeng Hao, Xinyi He and Qiao Hu    
Dolphin signals are effective carriers for underwater covert detection and communication. However, the environmental and cost constraints terribly limit the amount of data available in dolphin signal datasets are often limited. Meanwhile, due to the low ... ver más
Revista: Journal of Marine Science and Engineering    Formato: Electrónico

 
en línea
Hao Sun, Yuejin Du and Qi Li    
Amid the incessant evolution of the Internet, an array of cybersecurity threats has surged at an unprecedented rate. A notable antagonist within this plethora of attacks is the SQL injection assault, a prevalent form of Internet attack that poses a signi... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Parisa Rahimi, Amit Kumar Singh and Xiaohang Wang    
With increasing interest in multi-core systems, such as any communication systems, infra-structures can become targets for information leakages via covert channel communication. Covert channel attacks lead to leaking secret information and data. To desig... ver más
Revista: Journal of Low Power Electronics and Applications    Formato: Electrónico

 
en línea
S. V. Hayrapetyan,K.S. Zaytsev     Pág. 30 - 38
The purpose of this paper is to describe the developed method of detecting network covert timing channels, based on machine learning algorithms. Detection of network covert channels is an actual problem, since the latter can be used to leak confidential ... ver más
Revista: International Journal of Open Information Technologies    Formato: Electrónico

 
en línea
Timur Karimov, Vyacheslav Rybin, Georgii Kolev, Ekaterina Rodionova and Denis Butusov    
Communication systems based on chaotic synchronization are gaining interest in the area of secure and covert data transmission. In this paper, a novel digital communication technique based on a coherent chaotic data transmission approach is proposed. In ... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Lilian Bossuet and El Mehdi Benhani    
Cache attacks are widespread on microprocessors and multi-processor system-on-chips but have not yet spread to heterogeneous systems-on-chip such as SoC-FPGA that are found in increasing numbers of applications on servers or in the cloud. This type of So... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Yabo Duan, Huaizhan Li, Suqin Wu and Kefei Zhang    
Inertial navigation is a crucial part of vehicle navigation systems in complex and covert surroundings. To address the low accuracy of vehicle inertial navigation in multifaced and covert surroundings, in this study, we proposed an inertial navigation er... ver más
Revista: ISPRS International Journal of Geo-Information    Formato: Electrónico

 
en línea
Jia Shi, Xuewen Zeng and Yang Li    
Standalone Name Resolution (SNR) is an essential component of many Information-Centric Networking (ICN) infrastructures that maps and stores the mappings of IDs and locators. The delivery of data can be realized only when the name resolution process is c... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Nisha Rawindaran, Ambikesh Jayal and Edmond Prakash    
In many developed countries, the usage of artificial intelligence (AI) and machine learning (ML) has become important in paving the future path in how data is managed and secured in the small and medium enterprises (SMEs) sector. SMEs in these developed ... ver más
Revista: Computers    Formato: Electrónico

« Anterior     Página: 1 de 4     Siguiente »