-
1
-
-
84955563192
-
Stretching the limits of steganography. Springer
-
Information Hiding
-
R. J. Anderson. Stretching the limits of steganography. Springer Lecture Notes in Computer Science, pages 39-48, 1996. Special Issue on Information Hiding.
-
(1996)
Lecture Notes in Computer Science
, Issue.SPEC. ISSUE
, pp. 39-48
-
-
Anderson, R.J.1
-
3
-
-
0032070303
-
On the limits of steganography
-
May copyright and privacy protection
-
R. J. Anderson and F. A. P. Petitcolas. On the limits of steganography. IEEE Journal of Selected Areas in Communications, 16(4):474-481, May 1998. Special Issue on copyright and privacy protection.
-
(1998)
IEEE Journal of Selected Areas in Communications
, vol.16
, Issue.4 SPEC. ISSUE
, pp. 474-481
-
-
Anderson, R.J.1
Petitcolas, F.A.P.2
-
6
-
-
84957886834
-
Steganalysis and game equilibria
-
M. Ettinger. Steganalysis and game equilibria. In Information Hiding, pages 319-328, 1998.
-
(1998)
Information Hiding
, pp. 319-328
-
-
Ettinger, M.1
-
10
-
-
85084160972
-
Network intrusion detection: Evasion, traffic normalization, and end-to-end protocol semantics
-
M. Handley, C. Kreibich, and V. Paxson. Network intrusion detection: Evasion, traffic normalization, and end-to-end protocol semantics. In Proceedings of USENIX Security Symposium, 2001.
-
(2001)
Proceedings of USENIX Security Symposium
-
-
Handley, M.1
Kreibich, C.2
Paxson, V.3
-
14
-
-
0031996445
-
Exploring steganography: Seeing the unseen
-
February
-
N. F. Johnson and S. Jajodia. Exploring steganography: Seeing the unseen. IEEE Computer, pages 26-34, February 1998.
-
(1998)
IEEE Computer
, pp. 26-34
-
-
Johnson, N.F.1
Jajodia, S.2
-
17
-
-
84855617755
-
-
JSteg Shell. http://www.tiac.net/users/korejwa/jsteg.htm.
-
JSteg Shell
-
-
-
20
-
-
0015672289
-
A note on the confinement problem
-
B. W. Lampson. A note on the confinement problem. Communications of the ACM, 16(10):613-615, 1973.
-
(1973)
Communications of the ACM
, vol.16
, Issue.10
, pp. 613-615
-
-
Lampson, B.W.1
-
23
-
-
84855626194
-
-
Outguess
-
Outguess. http://www.outguess.org/.
-
-
-
-
24
-
-
0033295259
-
Bro: A system for detecting network intruders in real-time
-
December
-
V. Paxson. Bro: A system for detecting network intruders in real-time. Computer Networks, 31(23-24):2435-2463, December 1999.
-
(1999)
Computer Networks
, vol.31
, Issue.23-24
, pp. 2435-2463
-
-
Paxson, V.1
-
26
-
-
0000230675
-
Attacks on copyright marking systems
-
F. A. P. Petitcolas, R. J. Anderson, and M. G. Kuhn. Attacks on copyright marking systems. In Proceedings of Information Hiding, Second International Workshop, IH'98, 1998.
-
(1998)
Proceedings of Information Hiding, Second International Workshop, IH'98
-
-
Petitcolas, F.A.P.1
Anderson, R.J.2
Kuhn, M.G.3
-
27
-
-
84855634094
-
-
United States of America vs. Robert P. Hanssen
-
S. Pluta. United States of America vs. Robert P. Hanssen. http://www.fas.org/irp/ops/ci/hanssen_affidavit.html.
-
-
-
Pluta, S.1
-
29
-
-
0004145058
-
-
Technical report, Secure Networks Inc., January
-
T. H. Ptacek and T. N. Newsham. Insertion, evasion, and denial of service: Eluding network intrusion detection. Technical report, Secure Networks Inc., January 1998.
-
(1998)
Insertion, Evasion, and Denial of Service: Eluding Network Intrusion Detection
-
-
Ptacek, T.H.1
Newsham, T.N.2
-
30
-
-
2642558406
-
Covert channels in the TCP/IP protocol suite
-
C. H. Rowland. Covert channels in the TCP/IP protocol suite. First Monday, 1996.
-
(1996)
First Monday
-
-
Rowland, C.H.1
-
31
-
-
0001217738
-
The prisoners' problem and the subliminal channel
-
D. Chaum, editor, Plenum Press, New York and London, August 1983
-
G. J. Simmons. The prisoners' problem and the subliminal channel. In D. Chaum, editor, Advances in Cryptography: Proceedings of Crypto-83, pages 51-67. Plenum Press, New York and London, 1984, August 1983.
-
(1984)
Advances in Cryptography: Proceedings of Crypto-83
, pp. 51-67
-
-
Simmons, G.J.1
-
33
-
-
84855630351
-
-
Stegdetect
-
Stegdetect. http://freshmeat.net/projects/stegdtetect/.
-
-
-
-
34
-
-
85088280676
-
-
Stirmark
-
∼fapp2/software/.
-
-
-
|