-
2
-
-
0039430385
-
Terror groups hide behind web encryption
-
5 Feb
-
J. Kelley, "Terror groups hide behind web encryption," USA Today, 5 Feb 2001.
-
(2001)
USA Today
-
-
Kelley, J.1
-
3
-
-
84891395253
-
Bin laden: Steganography master?
-
7 Feb; Accessed on 23 February 2002
-
D. McCullaugh, "Bin laden: Steganography master?," Wired News, 7 Feb 2001. Available at: http://www.wired.com/new/politics/0,1283,41658,html, Accessed on 23 February 2002.
-
(2001)
Wired News
-
-
McCullaugh, D.1
-
4
-
-
0141818515
-
Boehlert secures an additional $20 million for rome lab; defense budget bill awaits senate action
-
Accessed on 16 February
-
J. Philipps, "Boehlert secures an additional $20 million for rome lab; defense budget bill awaits senate action." Available at: http://www.house.gov/boehlert/defenseapprops03.htm, Accessed on 16 February 2003.
-
(2003)
-
-
Philipps, J.1
-
7
-
-
84947551624
-
Cdis: Towards a computer immune system for detecting network intrusions
-
P. D. Williams, K. P. Anchor, J. L. Bebo, G. H. Gunsch, and G. B. Lamont, "Cdis: Towards a computer immune system for detecting network intrusions," Lecture Notes in Computer Science 2212, pp. 117-133, 2001.
-
(2001)
Lecture Notes in Computer Science
, vol.2212
, pp. 117-133
-
-
Williams, P.D.1
Anchor, K.P.2
Bebo, J.L.3
Gunsch, G.H.4
Lamont, G.B.5
-
8
-
-
35248889634
-
An evolutionary programming approach for detecting novel computer network attacks
-
IEEE Service Center, (Piscataway, NJ)
-
K. P. Anchor, G. B. Lamont, and G. H. Gunsch, "An evolutionary programming approach for detecting novel computer network attacks," in Proceedings of the 2002 Congress on Evolutionary Computation, pp. 1027-1032, IEEE Service Center, (Piscataway, NJ), 2002.
-
(2002)
Proceedings of the 2002 Congress on Evolutionary Computation
, pp. 1027-1032
-
-
Anchor, K.P.1
Lamont, G.B.2
Gunsch, G.H.3
-
9
-
-
0004064292
-
Detecting steganographic messages in digital images
-
Tech. Rep. TR2001-412, Dartmouth College, Hanover, NH
-
H. Farid, "Detecting steganographic messages in digital images," Tech. Rep. TR2001-412, Dartmouth College, Hanover, NH, 2001.
-
(2001)
-
-
Farid, H.1
-
10
-
-
35248846436
-
Detecting hidden messages using higher-order statistics and support vector machines
-
S. Lyu and H. Farid, "Detecting hidden messages using higher-order statistics and support vector machines," Lecture Notes in Computer Science 2578, pp. 340-354, 2002.
-
(2002)
Lecture Notes in Computer Science
, vol.2578
, pp. 340-354
-
-
Lyu, S.1
Farid, H.2
-
11
-
-
0003530622
-
-
O'Reilly and Associates, Inc., Sebastopol, CA
-
J. D. Murray and W. VanRyper, Encyclopedia of Graphics File Formats, O'Reilly and Associates, Inc., Sebastopol, CA, 1994.
-
(1994)
Encyclopedia of Graphics File Formats
-
-
Murray, J.D.1
VanRyper, W.2
-
12
-
-
0141818512
-
Jpeg-jsteg. Computer software - Modification of the independent JPEG group's JPEG software (release 4) for 2-bit steganography in JFIF output files
-
Accessed on 23 February
-
D. Upham, "Jpeg-jsteg." Computer Software - Modification of the Independent JPEG Group's JPEG software (release 4) for 2-bit steganography in JFIF output files. Available at: ftp://ftp.funet.fi/pub/crypt/steganography, Accessed on 23 February 2002.
-
(2002)
-
-
Upham, D.1
-
13
-
-
0034509108
-
Steganalysis of lsb encoding in color images
-
IEEE Press, (New York)
-
J. Fridrich, R. Du, and M. Long, "Steganalysis of lsb encoding in color images," in Proceedings of the IEEE International Conference on Multimedia and Expo, pp. 1279-1282, IEEE Press, (New York), 2000.
-
(2000)
Proceedings of the IEEE International Conference on Multimedia and Expo
, pp. 1279-1282
-
-
Fridrich, J.1
Du, R.2
Long, M.3
-
14
-
-
84892764719
-
Attacks on steganographic systems - Breaking the steganographic utilities ezstego, jsteg, steganos, and s-tools - and some lessons learned
-
A. Westfeld and A. Pfitzmann, "Attacks on steganographic systems - breaking the steganographic utilities ezstego, jsteg, steganos, and s-tools - and some lessons learned," Lecture Notes in Computer Science 1768, pp. 61-75, 2000.
-
(2000)
Lecture Notes in Computer Science
, vol.1768
, pp. 61-75
-
-
Westfeld, A.1
Pfitzmann, A.2
-
15
-
-
33847721963
-
Outguess
-
Computer Software; Accessed on 23 February 2002
-
N. Provos, "Outguess." Computer Software. Available at: http://www.outguess.org, Accessed on 23 February 2002.
-
-
-
Provos, N.1
-
16
-
-
0036034444
-
Practical steganalysis of digital images - State of the art
-
Jan.
-
J. Fridrich and M. Goljan, "Practical steganalysis of digital images - state of the art," Proc. SPIE Photonics West 2002: Electronic Imaging, Security and Watermarking of Multimedia Contents IV 4675, pp. 1-13, Jan. 2002.
-
(2002)
Proc. SPIE Photonics West 2002: Electronic Imaging, Security and Watermarking of Multimedia Contents IV
, vol.4675
, pp. 1-13
-
-
Fridrich, J.1
Goljan, M.2
-
17
-
-
4243533991
-
Ezstego and stego
-
Computer Software; Accessed on 23 February
-
R. Machado, "Ezstego and stego." Computer Software. Available at: http://www.stego.com, Accessed on 23 February 2002.
-
(2002)
-
-
Machado, R.1
-
20
-
-
0026239193
-
Wavelets and signal processing
-
Oct.
-
O. Rioul and M. Vetterli, "Wavelets and signal processing," IEEE SP Magazine, pp. 14-38, Oct. 1991.
-
(1991)
IEEE SP Magazine
, pp. 14-38
-
-
Rioul, O.1
Vetterli, M.2
-
21
-
-
0006399417
-
Wavelet-based audio embedding and audio/video compression
-
Master's thesis, Department and Electrical and Computer Engineering, Graduate School of Engineering and Management, Air Force Institute of Technology, Wright Patterson Air Force Base, OH, Mar
-
M. J. Mendenhall, "Wavelet-based audio embedding and audio/video compression," Master's thesis, Department and Electrical and Computer Engineering, Graduate School of Engineering and Management, Air Force Institute of Technology, Wright Patterson Air Force Base, OH, Mar. 2001.
-
(2001)
-
-
Mendenhall, M.J.1
-
23
-
-
0031258214
-
Computer immunology
-
S. Forest, S. A. Hofmeyr, and A. Somayaji, "Computer immunology," Communications of the ACM 40(10), pp. 88-96, 1996.
-
(1996)
Communications of the ACM
, vol.40
, Issue.10
, pp. 88-96
-
-
Forest, S.1
Hofmeyr, S.A.2
Somayaji, A.3
-
24
-
-
0009896497
-
A distributed agent architecture for a computer virus immune system
-
Master's thesis, Department of Electrical and Computer Engineering, Graduate School of Engineering and Management, Air Force Institute of Technology, Wright Patterson Air Force Base, OH, Mar.
-
P. K. Harmer, "A distributed agent architecture for a computer virus immune system," Master's thesis, Department of Electrical and Computer Engineering, Graduate School of Engineering and Management, Air Force Institute of Technology, Wright Patterson Air Force Base, OH, Mar. 2000.
-
(2000)
-
-
Harmer, P.K.1
-
25
-
-
0036613003
-
An artificial immune system architecture for computer security applications
-
June
-
P. K. Harmer, P. D. Williams, G. H. Gunsch, and G. B. Lamont, "An artificial immune system architecture for computer security applications," IEEE Transactions on Evolutionary Computation 6, pp. 252-280, June 2002.
-
(2002)
IEEE Transactions on Evolutionary Computation
, vol.6
, pp. 252-280
-
-
Harmer, P.K.1
Williams, P.D.2
Gunsch, G.H.3
Lamont, G.B.4
-
26
-
-
0009950263
-
-
McGraw-Hill
-
G. Lamont, R. Marmelstein, and D. Van Veldhuizen, A Distributed Architecture for a Self-Adaptive Computer Virus Immune System, New Ideas on Optimization, McGraw-Hill, 1999.
-
(1999)
A Distributed Architecture for a Self-Adaptive Computer Virus Immune System, New Ideas on Optimization
-
-
Lamont, G.1
Marmelstein, R.2
Van Veldhuizen, D.3
-
28
-
-
0003913211
-
-
T. Back, D. B. Fogel, and Z. Michalewicz, eds.; Institute of Physics Publishers
-
T. Back, D. B. Fogel, and Z. Michalewicz, eds., Evolutionary Computation 1: Basic Algorithms and Operators, Institute of Physics Publishers, 2000.
-
(2000)
Evolutionary Computation 1: Basic Algorithms and Operators
-
-
|