-
1
-
-
32644465248
-
-
CERT and the National Threat Assessment Center, Aug
-
M. R. Randazzo, M. Keeney, E. Kowalski, D. Cappelli, and A. Moore, "Insider Threat Study: Illicit Cyber Activity in the Banking and Finance Sector", CERT and the National Threat Assessment Center, Aug. 2004.
-
(2004)
Insider Threat Study: Illicit Cyber Activity in the Banking and Finance Sector
-
-
Randazzo, M.R.1
Keeney, M.2
Kowalski, E.3
Cappelli, D.4
Moore, A.5
-
2
-
-
0010886652
-
The insider threat to information systems: The psychology of the dangerous insider
-
Sept
-
E. D. Shaw, K. G. Ruby, and J. M. Post, "The insider threat to information systems: The psychology of the dangerous insider", Security Awareness Bulletin, vol. 2-98, pp. 27-46, Sept. 1998.
-
(1998)
Security Awareness Bulletin
, vol.2-98
, pp. 27-46
-
-
Shaw, E.D.1
Ruby, K.G.2
Post, J.M.3
-
4
-
-
84946410215
-
Detecting insider threats by monitoring system call activity
-
June
-
N. Nguyen, P. Reiher, G.H. Kuenning, "Detecting insider threats by monitoring system call activity", IEEE Information Assurance Workshop, pp. 45-52, June 2003.
-
(2003)
IEEE Information Assurance Workshop
, pp. 45-52
-
-
Nguyen, N.1
Reiher, P.2
Kuenning, G.H.3
-
7
-
-
37249042679
-
Remote wireless transmission and error recovery of log data
-
Y. Zhao, N. Li, and C. Wang., "Remote wireless transmission and error recovery of log data", Applied Geophysics, vol. 4, pp. 308-312, 2007.
-
(2007)
Applied Geophysics
, vol.4
, pp. 308-312
-
-
Zhao, Y.1
Li, N.2
Wang, C.3
-
8
-
-
63349086607
-
-
skype, http://www.skype.com
-
skype, http://www.skype.com
-
-
-
-
9
-
-
21844443126
-
Steganography and steganalysis in voice-over IP scenarios: Operational aspects and first experiences with a new steganalysis tool set
-
Magdeburg
-
J. Dittmann, D. Hesse, and R. Hillert, "Steganography and steganalysis in voice-over IP scenarios: operational aspects and first experiences with a new steganalysis tool set", Proceedings of SPIE on Security, Steganography, and Watermarking of Multimedia Contents VII, vol. 5681, pp. 607-618, Magdeburg, 2005.
-
(2005)
Proceedings of SPIE on Security, Steganography, and Watermarking of Multimedia Contents VII
, vol.5681
, pp. 607-618
-
-
Dittmann, J.1
Hesse, D.2
Hillert, R.3
-
11
-
-
84904224992
-
Steganalysis of images created using current steganography software
-
David Aucsmith Ed, Information Hiding, Springer-Verlag Berlin Heidelberg
-
N.F. Johnson, and S. Jajodia, "Steganalysis of images created using current steganography software", David Aucsmith (Ed.): Information Hiding, LNCS 1525, pp. 32-47. Springer-Verlag Berlin Heidelberg, 1998.
-
(1998)
LNCS
, vol.1525
, pp. 32-47
-
-
Johnson, N.F.1
Jajodia, S.2
-
12
-
-
33646890686
-
Traffic classification on the fly
-
L. Bernaille, R. Teixeira, I. Akodkenou, A. Soule, and K. Salamatian, "Traffic classification on the fly", ACM SIGCOMM Comput. Commun. Rev. vol. 36, no. 2, pp. 23-26, 2006.
-
(2006)
ACM SIGCOMM Comput. Commun. Rev
, vol.36
, Issue.2
, pp. 23-26
-
-
Bernaille, L.1
Teixeira, R.2
Akodkenou, I.3
Soule, A.4
Salamatian, K.5
-
13
-
-
38549152519
-
Privacy Vulnerabilities in Encrypted HTTP Streams
-
G. Bissias, M. Liberatore, D. Jensen, and B. Levine, "Privacy Vulnerabilities in Encrypted HTTP Streams", Proceedings of Privacy Enhancing Technologies Workshop, pp. 1-11, 2005.
-
(2005)
Proceedings of Privacy Enhancing Technologies Workshop
, pp. 1-11
-
-
Bissias, G.1
Liberatore, M.2
Jensen, D.3
Levine, B.4
-
14
-
-
62849120844
-
A Survey of Techniques for Internet Traffic Classification using Machine Learning
-
to appear in
-
T.T.T. Nguyen and G. Armitage, "A Survey of Techniques for Internet Traffic Classification using Machine Learning", to appear in IEEE Communications Surveys and Tutorials, 2008.
-
(2008)
IEEE Communications Surveys and Tutorials
-
-
Nguyen, T.T.T.1
Armitage, G.2
-
15
-
-
33847303101
-
BLINC: Multilevel traffic classification in the dark
-
T. Karagiannis, K. Papagiannaki, and M. Faloutsos, "BLINC: multilevel traffic classification in the dark", ACM SIGCOMM Comput. Commun. Rev., pp. 229-240, 2005.
-
(2005)
ACM SIGCOMM Comput. Commun. Rev
, pp. 229-240
-
-
Karagiannis, T.1
Papagiannaki, K.2
Faloutsos, M.3
-
16
-
-
0003396729
-
-
Upper Saddle River, NJ, Prentice Hall
-
C. S. Burrus, R. A. Gopinath, and H. Guo, Introduction to Wavelets and Wavelets Transforms, a Primer, Upper Saddle River, NJ, Prentice Hall, 1998.
-
(1998)
Introduction to Wavelets and Wavelets Transforms, a Primer
-
-
Burrus, C.S.1
Gopinath, R.A.2
Guo, H.3
-
17
-
-
38549174159
-
Detecting HTTP Tunnels with Statistical Mechanisms
-
M. Crotti, M. Dusi, F. Gringoli, L. Salgarelli, "Detecting HTTP Tunnels with Statistical Mechanisms", IEEE International Conference on Communications (ICC) '07, pp.6162-6168, 2007.
-
(2007)
IEEE International Conference on Communications (ICC) '07
, pp. 6162-6168
-
-
Crotti, M.1
Dusi, M.2
Gringoli, F.3
Salgarelli, L.4
-
21
-
-
84925680300
-
Video transcoding architectures and techniques: An overview
-
Mar
-
A. Vetro, C. Christopoulos, and H. Sun, "Video transcoding architectures and techniques: an overview", Signal Processing Magazine, IEEE, vol. 20, no. 2, pp. 18-29, Mar 2003.
-
(2003)
Signal Processing Magazine, IEEE
, vol.20
, Issue.2
, pp. 18-29
-
-
Vetro, A.1
Christopoulos, C.2
Sun, H.3
-
22
-
-
63349110207
-
-
C. Rowland, http://www.firstmonday.dk/issues/issue25/rowland/
-
-
-
Rowland, C.1
-
24
-
-
56649091138
-
A novel audio Steganalysis based on high order statistics of a distortion measure with Hausdorff distance
-
11th Information Security ConferenceISC
-
Y. Liu, K. Chiang, C. Corbett, R. Archibald, B. Mukherjee, and D. Ghosal, "A novel audio Steganalysis based on high order statistics of a distortion measure with Hausdorff distance", 11th Information Security Conference(ISC) 2008, Lecture Notes in Computer Science, Vol. 5222, pp. 487-500.
-
(2008)
Lecture Notes in Computer Science
, vol.5222
, pp. 487-500
-
-
Liu, Y.1
Chiang, K.2
Corbett, C.3
Archibald, R.4
Mukherjee, B.5
Ghosal, D.6
-
25
-
-
0242576352
-
Steganalysis of audio based on audio quality metrics
-
Santa Clara
-
H. Ozer, I. Avcibas, B. Sankur, and N. Memon, "Steganalysis of audio based on audio quality metrics", Security and Watermarking of Multimedia Contents, pp. 55-66. Santa Clara, 2003.
-
(2003)
Security and Watermarking of Multimedia Contents
, pp. 55-66
-
-
Ozer, H.1
Avcibas, I.2
Sankur, B.3
Memon, N.4
-
26
-
-
0027657143
-
Comparing images using the Hausdorff distance
-
D. P. Huttenlocher, D. Klanderman, and W.J. Rucklidge, "Comparing images using the Hausdorff distance", IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 15, pp. 850-863, 1993.
-
(1993)
IEEE Transactions on Pattern Analysis and Machine Intelligence
, vol.15
, pp. 850-863
-
-
Huttenlocher, D.P.1
Klanderman, D.2
Rucklidge, W.J.3
-
27
-
-
0036452586
-
Detecting hidden messages using higherorder statistical models
-
H. Farid, "Detecting hidden messages using higherorder statistical models", IEEE International Conference on Image Processing, vol. 2, pp. 905-908, 2002.
-
(2002)
IEEE International Conference on Image Processing
, vol.2
, pp. 905-908
-
-
Farid, H.1
-
28
-
-
24744444102
-
Effective Steganalysis Based on Statistical Moments of Wavelet Characteristic Function
-
Y. Q. Shi, G. Xuan, C. Yang, J. Gao, Z. Zhang, P. Chai, D. Zou, C. Chen, and W. Chen, "Effective Steganalysis Based on Statistical Moments of Wavelet Characteristic Function", IEEE International Conference on Information Technology, pp. 1195-1198, 2005.
-
(2005)
IEEE International Conference on Information Technology
, pp. 1195-1198
-
-
Shi, Y.Q.1
Xuan, G.2
Yang, C.3
Gao, J.4
Zhang, Z.5
Chai, P.6
Zou, D.7
Chen, C.8
Chen, W.9
|