default search action
EURASIP Journal on Information Security, Volume 2014
Volume 2014, 2014
- Vojtech Holub, Jessica J. Fridrich, Tomás Denemark:
Universal distortion function for steganography in an arbitrary domain. 1 - Rimba Whidiana Ciptasari, Kyung Hyune Rhee, Kouichi Sakurai:
An enhanced audio ownership protection scheme based on visual cryptography. 2 - Eirini D. Karapistoli, Anastasios A. Economides:
ADLU: a novel anomaly detection and location-attribution algorithm for UWB wireless sensor networks. 3 - Jelena Isacenkova, Olivier Thonnard, Andrei Costin, Aurélien Francillon, Davide Balzarotti:
Inside the SCAM Jungle: A Closer Look at 419 Scam Email Operations. 4 - Yousra Chabchoub, Raja Chiky, Betul Dogan:
How can sliding HyperLogLog and EWMA detect port scan attacks in IP traffic? 5 - Stefan Jenisch, Andreas Uhl:
A detailed evaluation of format-compliant encryption methods for JPEG XR-compressed images. 6 - Roger Piqueras Jover, Joshua Lackey, Arvind Raghavan:
Enhancing the security of LTE networks against jamming attacks. 7 - Saiful Islam, Mangat Rai Modi, Phalguni Gupta:
Edge-based image steganography. 8 - Anh Thu Phan Ho, Bao An Mai Hoang, Wadih Sawaya, Patrick Bas:
Document authentication using graphical codes: reliable performance analysis and channel optimization. 9 - Tiziano Bianchi, Alessia De Rosa, Marco Fontani, Giovanni Rocciolo, Alessandro Piva:
Detection and localization of double compression in MP3 audio tracks. 10 - Christian Richthammer, Michael Netter, Moritz Riesner, Johannes Sänger, Günther Pernul:
Taxonomy of social network data types. 11 - Nada Essaouini, Frédéric Cuppens, Nora Cuppens-Boulahia, Anas Abou El Kalam:
Conflict detection in obligation with deadline policies. 13 - Jake Drew, Tyler Moore:
Optimized combined-clustering methods for finding replicated criminal websites. 14 - Pratik Narang, Chittaranjan Hota, V. N. Venkatakrishnan:
PeerShark: flow-clustering and conversation-generation for malicious peer-to-peer traffic identification. 15 - Haya Schulmann, Michael Waidner:
DNSSEC for cyber forensics. 16 - Xin Hu, Ting Wang, Marc Ph. Stoecklin, Douglas Lee Schales, Jiyong Jang, Reiner Sailer:
MUSE: asset risk scoring in enterprise network with mutually reinforced reputation propagation. 17
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.