X
Search Filters
Format Format
Format Format
X
Sort by Item Count (A-Z)
Filter by Count
Newspaper Article (1348) 1348
Journal Article (1322) 1322
Conference Proceeding (444) 444
Magazine Article (258) 258
Government Document (209) 209
Publication (112) 112
Book Chapter (83) 83
Book Review (76) 76
Trade Publication Article (69) 69
Book / eBook (29) 29
Dissertation (24) 24
Reference (24) 24
Newsletter (20) 20
Transcript (19) 19
Web Resource (8) 8
Paper (4) 4
Report (4) 4
Video Recording (4) 4
more...
Subjects Subjects
Subjects Subjects
X
Sort by Item Count (A-Z)
Filter by Count
covert operations (2128) 2128
espionage (242) 242
covert channel (241) 241
security (237) 237
intelligence gathering (236) 236
national security (234) 234
covert communication (233) 233
covert (231) 231
terrorism (213) 213
humans (183) 183
steganography (183) 183
covert channels (176) 176
armed forces (166) 166
international relations (160) 160
engineering, electrical & electronic (156) 156
history (149) 149
research (149) 149
index medicus (146) 146
presidents (146) 146
telecommunications (142) 142
channels (135) 135
criminal investigations (132) 132
analysis (130) 130
computer science, information systems (127) 127
politics (122) 122
computer science (120) 120
intelligence services (120) 120
male (117) 117
communication (114) 114
receivers (114) 114
war (114) 114
surveillance (113) 113
information hiding (112) 112
government agencies (110) 110
congressional committees (109) 109
female (109) 109
special forces (104) 104
nuclear weapons (100) 100
social networks (98) 98
internet (95) 95
adult (94) 94
soviet union (93) 93
business (91) 91
diplomatic & consular services (91) 91
women (89) 89
democracy (88) 88
studies (87) 87
weapons (87) 87
protocols (85) 85
books (83) 83
methods (83) 83
education (82) 82
networks (82) 82
government (80) 80
foreign policy (78) 78
children (77) 77
civil liberties (77) 77
computer science, theory & methods (76) 76
elections (75) 75
political parties (75) 75
world war ii (75) 75
investigations (74) 74
medicine (74) 74
department of defense (73) 73
law enforcement (73) 73
economic policy (72) 72
information security (72) 72
jews (72) 72
congress (71) 71
intelligence (71) 71
government spending (70) 70
political science (70) 70
investigate covert arms transactions with iran, select. house (69) 69
senate (69) 69
ecology (68) 68
immigration (68) 68
police (68) 68
wireless communications (68) 68
cryptography (67) 67
department of state (67) 67
reagan, ronald (67) 67
algorithms (66) 66
psychology (66) 66
house of representatives (65) 65
network security (65) 65
employment (64) 64
timing (64) 64
veterans (64) 64
central america (63) 63
science and technology (63) 63
human rights (62) 62
privacy (62) 62
children & youth (61) 61
intelligence service (61) 61
labor law (61) 61
military strategy (61) 61
nicaragua (61) 61
agriculture (60) 60
anniversaries (60) 60
cold war (59) 59
more...
Library Location Library Location
Library Location Library Location
X
Sort by Item Count (A-Z)
Filter by Count
Robarts - Stacks (14) 14
Collection Dvlpm't (Acquisitions) - Vendor file (4) 4
Media Commons - Audio Visual (4) 4
Trinity College (John W Graham) - Stacks (3) 3
UofT at Mississauga - Stacks (3) 3
Trinity College (John W Graham) - Reference (2) 2
UTL at Downsview - May be requested (2) 2
UofT at Mississauga - Reference (2) 2
UofT at Scarborough - Stacks (2) 2
New College (Ivey) - Stacks (1) 1
Online Resources - Online (1) 1
St. Michael's College (John M. Kelly) - Missing (1) 1
more...
Language Language
Language Language
X
Sort by Item Count (A-Z)
Filter by Count
English (3727) 3727
Japanese (36) 36
Chinese (16) 16
Spanish (8) 8
French (6) 6
Hindi (4) 4
Croatian (3) 3
German (3) 3
Korean (2) 2
Turkish (2) 2
Arabic (1) 1
Italian (1) 1
Polish (1) 1
Slovak (1) 1
more...
Publication Date Publication Date
Click on a bar to filter by decade
Slide to change publication date range


IEEE Journal of Selected Topics in Signal Processing, ISSN 1932-4553, 10/2015, Volume 9, Issue 7, pp. 1195 - 1205
Journal Article
IEEE Transactions on Information Theory, ISSN 0018-9448, 11/2019, Volume 65, Issue 11, pp. 7020 - 7044
Journal Article
IEEE Transactions on Information Theory, ISSN 0018-9448, 05/2016, Volume 62, Issue 5, pp. 2334 - 2354
Journal Article
IEEE Transactions on Information Theory, ISSN 0018-9448, 06/2016, Volume 62, Issue 6, pp. 3493 - 3503
Journal Article
Peer-to-Peer Networking and Applications, ISSN 1936-6442, 1/2019, Volume 12, Issue 1, pp. 143 - 157
Today, peer-to-peer (P2P) networks have risen to the top echelon of information sharing on the Internet. Consequently, it is a daunting task to prevent sharing... 
Covert channel | Information Systems and Communication Service | Information hiding | Security | P2P networks | Engineering | Steganography | Signal,Image and Speech Processing | Bit-torrent | Authentication | Communications Engineering, Networks | Computer Communication Networks | Handshake
Journal Article
IEEE Communications Letters, ISSN 1089-7798, 04/2017, Volume 21, Issue 4, pp. 941 - 944
Prior studies on covert communication with noise uncertainty adopted a worst-case approach from the warden's perspective. That is, the worst-case detection... 
Wireless communication | Analytical models | Uncertainty | Measurement uncertainty | Physical layer security | Robustness | Noise measurement | covert communication | noise uncertainty | LIMITS | AWGN | CHANNELS | TELECOMMUNICATIONS | UNDETECTABLE COMMUNICATION
Journal Article
IEEE Transactions on Information Theory, ISSN 0018-9448, 04/2019, Volume 65, Issue 4, pp. 2190 - 2212
Journal Article
IEEE Transactions on Wireless Communications, ISSN 1536-1276, 11/2018, Volume 17, Issue 11, pp. 7252 - 7267
Journal Article
2018, 1st ed. 2018, ISBN 9783319740829, 142
eBook
IEEE Transactions on Wireless Communications, ISSN 1536-1276, 09/2017, Volume 16, Issue 9, pp. 6193 - 6206
Recent work has established that when transmitter Alice wishes to communicate reliably to recipient Bob without detection by warden Willie, with additive white... 
Fading channels | Wireless communication | AWGN channels | Uncertainty | Low probability of detection communication | Receivers | Detectors | physical layer security | Jamming | wireless covert communication | AWGN CHANNELS | NOISE | TELECOMMUNICATIONS | LOW PROBABILITY | ENGINEERING, ELECTRICAL & ELECTRONIC
Journal Article
IEEE Transactions on Wireless Communications, ISSN 1536-1276, 07/2019, Volume 18, Issue 7, pp. 3542 - 3553
Journal Article
Journal of Neural Engineering, ISSN 1741-2560, 08/2012, Volume 9, Issue 4, pp. 045001 - 1-15
Journal Article
IEEE Transactions on Wireless Communications, ISSN 1536-1276, 07/2018, Volume 17, Issue 7, pp. 4766 - 4779
Journal Article
Electronics Letters, ISSN 0013-5194, 1/2015, Volume 51, Issue 1, pp. 116 - 118
Journal Article
IEEE Transactions on Wireless Communications, ISSN 1536-1276, 09/2018, Volume 17, Issue 9, pp. 6005 - 6017
In this paper, we study covert communication in wireless networks consisting of a transmitter, Alice, an intended receiver, Bob, a warden, Willie, and a... 
Transmitters | Wireless networks | Aggregates | signal processing | Interference | Receivers | Physical layer security | Throughput | stochastic geometry | covert wireless communication | PERFORMANCE | NOISE | TELECOMMUNICATIONS | NETWORK SECRECY | ENGINEERING, ELECTRICAL & ELECTRONIC | Fading | Wireless communications | Decoding | Shot noise | Density | Communication
Journal Article
IEEE Journal on Selected Areas in Communications, ISSN 0733-8716, 09/2013, Volume 31, Issue 9, pp. 1921 - 1930
We present a square root limit on the amount of information transmitted reliably and with low probability of detection (LPD) over additive white Gaussian noise... 
AWGN channels | Low probability of detection communication | Noise | Entropy | Vectors | Decoding | spread spectrum communication | Reliability | covert communication | Testing | STEGANOGRAPHY | CAPACITY | FISHER INFORMATION | WIRE-TAP CHANNEL | TELECOMMUNICATIONS | ENGINEERING, ELECTRICAL & ELECTRONIC
Journal Article
IEEE Transactions on Wireless Communications, ISSN 1536-1276, 12/2016, Volume 15, Issue 12, pp. 8394 - 8405
The recent square root law (SRL) for covert communication demonstrates that Alice can reliably transmit O(√n) bits to Bob in n uses of an additive white... 
AWGN channels | Wireless communication | Low probability of detection communication | Detectors | asynchronous communication | Decoding | timing channels | Reliability | Channel models | covert communication | Monitoring | spread spectrum | LIMITS | RELIABILITY | TELECOMMUNICATIONS | LOW PROBABILITY | ENGINEERING, ELECTRICAL & ELECTRONIC
Journal Article
No results were found for your search.

Cannot display more than 1000 results, please narrow the terms of your search.