Nowadays, in today’s society based on a wide range of the technical and computing devices, it opens wide scope for misusing vulnerabilities of managing software, for destructive or enriching purposes. Daily are developed and deployed increasingly sophisticated malicious software, enabling the controlling of contested system or misusing sensitive information that infected system stores. One of the yet unexplored areas represent non-standard forms of communication used by such software, without access to network services, which could in the future represent a real threat to certain conditions. This article describes the design and subsequent implementation of a special type of malicious software that communications components are based on IRC...
This dissertation is focused on developing a sub-area of acoustics that we call inaudible acoustics....
With the appearance of new Internet services like Voice over IP and IP television, malwares are in t...
The Internet has many aspects that make it ideal for communication and commerce. It makes selling pr...
This thesis investigates the security issues associated with human-computer interaction by speech, f...
Abstract — Covert channels can be used to circumvent system and network policies by establishing com...
The topic of covert acoustical communication in air has produced public attention, lately. In 2013, ...
Abstract: The topic of covert acoustical communication in air has produced public attention, lately....
Sonification, in which data is represented as sound, can be used to turn network attacks and network...
Malicious software, or malware for short, is software designed with a nefarious intent of harming th...
Article is devoted to the description of actual ways of possible distribution of malwares such, as “...
Covert channels can be used to circumvent system and network policies by establishing communications...
Water distribution systems are undergoing a process of intensive digitalization, adopting networked ...
Malware is software which was invented and meant for doing harms on computers. Malware is becoming a...
Abstract. Network intrusion detection has been generally dealt with using sophisticated software and...
Malware is software which was invented and meant for doing harms on computers. Malware is becoming a...
This dissertation is focused on developing a sub-area of acoustics that we call inaudible acoustics....
With the appearance of new Internet services like Voice over IP and IP television, malwares are in t...
The Internet has many aspects that make it ideal for communication and commerce. It makes selling pr...
This thesis investigates the security issues associated with human-computer interaction by speech, f...
Abstract — Covert channels can be used to circumvent system and network policies by establishing com...
The topic of covert acoustical communication in air has produced public attention, lately. In 2013, ...
Abstract: The topic of covert acoustical communication in air has produced public attention, lately....
Sonification, in which data is represented as sound, can be used to turn network attacks and network...
Malicious software, or malware for short, is software designed with a nefarious intent of harming th...
Article is devoted to the description of actual ways of possible distribution of malwares such, as “...
Covert channels can be used to circumvent system and network policies by establishing communications...
Water distribution systems are undergoing a process of intensive digitalization, adopting networked ...
Malware is software which was invented and meant for doing harms on computers. Malware is becoming a...
Abstract. Network intrusion detection has been generally dealt with using sophisticated software and...
Malware is software which was invented and meant for doing harms on computers. Malware is becoming a...
This dissertation is focused on developing a sub-area of acoustics that we call inaudible acoustics....
With the appearance of new Internet services like Voice over IP and IP television, malwares are in t...
The Internet has many aspects that make it ideal for communication and commerce. It makes selling pr...