Open Access. Powered by Scholars. Published by Universities.®

Computer Sciences Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 2 of 2

Full-Text Articles in Computer Sciences

Covert Shells, John Christian Smith Nov 2000

Covert Shells, John Christian Smith

John Christian Smith

The potential for covert communications exist anywhere that legitimate communication channels are in use. In order to maintain control of the channel once exploited, the insertion of a backdoor Trojan horse server, to be used with a client that provides shell access, is often a necessary prerequisite to establishing and using a covert channel long term.

We discuss covert channel communications methods ranging from embedded channels to disguised protocols. What follows is a review of available covert shell tools. The underground, historical evolution of covert shells is reviewed, focusing on selected, available tools, which range from simple encapsulation methods to …


Ann As A Tool For Medical Prognosis, Sameem Abdul Kareem Jan 2000

Ann As A Tool For Medical Prognosis, Sameem Abdul Kareem

Sameem Abdul Kareem

The analysis of cancer survival is used to determine the efficiency of treatment programmes and protocols; it is also used to determine the type of treatment. At the individual level a prediction of cancer survival can help patients make informed decisions with regards to their quality of life and future finances. Currently available prediction methods apply to groups of people, and may not be adequate to predict treatment outcome for individual patients. This paper presents a conceptual model of a cancer knowledge base incorporating a computer-based predictor for survival. It proposes the use of an artificial neural network (ANN) as …