-
1
-
-
84886287589
-
-
Facebook, http://www.facebook.com
-
Facebook
-
-
-
2
-
-
80053011432
-
-
Flickr, http://www.flickr.com
-
Flickr
-
-
-
3
-
-
80053035905
-
-
JSteg, http://zooid.org/~paul/crypto/jsteg/
-
JSteg
-
-
-
4
-
-
80053050001
-
-
Koobface, http://en.wikipedia.org/wiki/Koobface
-
Koobface
-
-
-
5
-
-
0034721164
-
Error and attack tolerance of complex networks
-
Albert, R., Jeong, H., Barabasi, A.-L.: Error and attack tolerance of complex networks. Nature 406(6794), 378-382 (2000)
-
(2000)
Nature
, vol.406
, Issue.6794
, pp. 378-382
-
-
Albert, R.1
Jeong, H.2
Barabasi, A.-L.3
-
7
-
-
30744445178
-
Perturbed quantization steganography
-
Fridrich, J.J., Goljan, M., Soukal, D.: Perturbed quantization steganography. Multimedia Syst. 11(2), 98-107 (2005)
-
(2005)
Multimedia Syst.
, vol.11
, Issue.2
, pp. 98-107
-
-
Fridrich, J.J.1
Goljan, M.2
Soukal, D.3
-
8
-
-
38849102269
-
Statistically undetectable jpeg steganography: Dead ends challenges, and opportunities
-
Kundur, D., Prabhakaran, B., Dittmann, J., Fridrich, J.J. (eds.) ACM, New York
-
Fridrich, J.J., Pevný, T., Kodovský, J.: Statistically undetectable jpeg steganography: dead ends challenges, and opportunities. In: Kundur, D., Prabhakaran, B., Dittmann, J., Fridrich, J.J. (eds.) Proceedings of the 9th workshop on Multimedia & Security, MM&Sec 2007, Dallas, Texas, USA, September 20-21, pp. 3-14. ACM, New York (2007)
-
(2007)
Proceedings of the 9th Workshop on Multimedia & Security, MM&Sec 2007, Dallas, Texas, USA, September 20-21
, pp. 3-14
-
-
Fridrich, J.J.1
Pevný, T.2
Kodovský, J.3
-
9
-
-
85093871360
-
Rishi: Identify bot contaminated hosts by IRC nickname evaluation
-
Goebel, J., Holz, T.: Rishi: Identify bot contaminated hosts by IRC nickname evaluation. In: HotBots (2007)
-
(2007)
HotBots
-
-
Goebel, J.1
Holz, T.2
-
10
-
-
85075837457
-
BotMiner: Clustering analysis of network traffic for protocol- And structure-independent botnet detection
-
Gu, G., Perdisci, R., Zhang, J., Lee, W.: BotMiner: Clustering analysis of network traffic for protocol- and structure-independent botnet detection. In: Proceedings of the 17th USENIX Security Symposium, Security 2008 (2008)
-
(2008)
Proceedings of the 17th USENIX Security Symposium, Security 2008
-
-
Gu, G.1
Perdisci, R.2
Zhang, J.3
Lee, W.4
-
12
-
-
38149033612
-
Modified Matrix Encoding Technique for Minimal Distortion Steganography
-
Camenisch, J.L., Collberg, C.S., Johnson, N.F., Sallee, P. (eds.) IH 2006. Springer, Heidelberg
-
Kim, Y., Duric, Z., Richards, D.: Modified Matrix Encoding Technique for Minimal Distortion Steganography. In: Camenisch, J.L., Collberg, C.S., Johnson, N.F., Sallee, P. (eds.) IH 2006. LNCS, vol. 4437, pp. 314-327. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4437
, pp. 314-327
-
-
Kim, Y.1
Duric, Z.2
Richards, D.3
-
13
-
-
49949111194
-
Generalised category attack-improving histogram-based attack on JPEG LSB embedding
-
Furon, T., Cayre, F., Doërr, G., Bas, P. (eds.) IH 2007. Springer, Heidelberg
-
Lee, K., Westfeld, A.: Generalised category attack-improving histogram-based attack on JPEG LSB embedding. In: Furon, T., Cayre, F., Doërr, G., Bas, P. (eds.) IH 2007. LNCS, vol. 4567, pp. 11-13. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.4567
, pp. 11-13
-
-
Lee, K.1
Westfeld, A.2
-
14
-
-
38849120767
-
Category attack for lsb embedding of jpeg images
-
Shi, Y.Q., Jeon, B. (eds.) IWDW 2006. Springer, Heidelberg
-
Lee, K., Westfeld, A., Lee, S.: Category attack for lsb embedding of jpeg images. In: Shi, Y.Q., Jeon, B. (eds.) IWDW 2006. LNCS, vol. 4283, pp. 35-48. Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.4283
, pp. 35-48
-
-
Lee, K.1
Westfeld, A.2
Lee, S.3
-
16
-
-
85059753615
-
Botgrep: Finding p2p bots with structured graph analysis
-
USENIX Association, Berkeley
-
Nagaraja, S., Mittal, P., Hong, C.-Y., Caesar, M., Borisov, N.: Botgrep: finding p2p bots with structured graph analysis. In: Proceedings of the 19th USENIX Conference on Security, USENIX Security 2010, p. 7. USENIX Association, Berkeley (2010)
-
(2010)
Proceedings of the 19th USENIX Conference on Security, USENIX Security 2010
, pp. 7
-
-
Nagaraja, S.1
Mittal, P.2
Hong, C.-Y.3
Caesar, M.4
Borisov, N.5
-
17
-
-
77955020947
-
Take a Deep Breath: A Stealthy, Resilient and Cost-Effective Botnet Using Skype
-
Kreibich, C., Jahnke, M. (eds.) DIMVA 2010. Springer, Heidelberg
-
Nappa, A., Fattori, A., Balduzzi, M., Dell'Amico, M., Cavallaro, L.: Take a Deep Breath: A Stealthy, Resilient and Cost-Effective Botnet Using Skype. In: Kreibich, C., Jahnke, M. (eds.) DIMVA 2010. LNCS, vol. 6201, pp. 81-100. Springer, Heidelberg (2010)
-
(2010)
LNCS
, vol.6201
, pp. 81-100
-
-
Nappa, A.1
Fattori, A.2
Balduzzi, M.3
Dell'Amico, M.4
Cavallaro, L.5
-
18
-
-
35248875661
-
A steganographic embedding undetectable by JPEG compatibility steganalysis
-
Petitcolas, F.A.P. (ed.) IH 2002. Springer, Heidelberg
-
Newman, Moskowitz, Chang, Brahmadesam: A steganographic embedding undetectable by JPEG compatibility steganalysis. In: Petitcolas, F.A.P. (ed.) IH 2002. LNCS, vol. 2578, pp. 258-277. Springer, Heidelberg (2003)
-
(2003)
LNCS
, vol.2578
, pp. 258-277
-
-
Newman1
Moskowitz2
Chang3
Brahmadesam4
-
20
-
-
85084094918
-
A foray into Conficker's logic and rendezvous points
-
Porras, P., Saidi, H., Yegneswaran, V.: A foray into Conficker's logic and rendezvous points. In: 2nd Usenix Workshop on Large-Scale Exploits and Emergent Threats, LEET 2009 (2009)
-
(2009)
2nd Usenix Workshop on Large-Scale Exploits and Emergent Threats, LEET 2009
-
-
Porras, P.1
Saidi, H.2
Yegneswaran, V.3
-
21
-
-
3042742327
-
Hide and seek: An introduction to steganography
-
Provos, N., Honeyman, P.: Hide and seek: An introduction to steganography. IEEE Security and Privacy 1, 32-44 (2003)
-
(2003)
IEEE Security and Privacy
, vol.1
, pp. 32-44
-
-
Provos, N.1
Honeyman, P.2
-
22
-
-
35048819204
-
Model-based steganography
-
Kalker, T., Cox, I., Ro, Y.M. (eds.) IWDW 2003. Springer, Heidelberg
-
Sallee, P.: Model-based steganography. In: Kalker, T., Cox, I., Ro, Y.M. (eds.) IWDW 2003. LNCS, vol. 2939, pp. 154-167. Springer, Heidelberg (2004)
-
(2004)
LNCS
, vol.2939
, pp. 154-167
-
-
Sallee, P.1
-
23
-
-
49949091527
-
YASS: Yet Another Steganographic Scheme That Resists Blind Steganalysis
-
Furon, T., Cayre, F., Doërr, G.J., Bas, P. (eds.) IH 2007. Springer, Heidelberg
-
Solanki, K., Sarkar, A., Manjunath, B.S.: YASS: Yet Another Steganographic Scheme That Resists Blind Steganalysis. In: Furon, T., Cayre, F., Doërr, G.J., Bas, P. (eds.) IH 2007. LNCS, vol. 4567, pp. 16-31. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.4567
, pp. 16-31
-
-
Solanki, K.1
Sarkar, A.2
Manjunath, B.S.3
-
24
-
-
78649828992
-
Provably secure steganography: Achieving zero k-l divergence using statistical restoration
-
Solanki, K., Sullivan, K., Madhow, U., Manjunath, B., Chandrasekaran, S.: Provably secure steganography: Achieving zero k-l divergence using statistical restoration. In: ICIP (2006)
-
(2006)
ICIP
-
-
Solanki, K.1
Sullivan, K.2
Madhow, U.3
Manjunath, B.4
Chandrasekaran, S.5
-
25
-
-
49049107082
-
Analysis of the Storm and Nugache trojans: P2P is here
-
December
-
Stover, S., Dittrich, D., Hernandez, J., Dietrich, S.: Analysis of the Storm and Nugache trojans: P2P is here. Login 32(6) (December 2007)
-
(2007)
Login
, vol.32
, Issue.6
-
-
Stover, S.1
Dittrich, D.2
Hernandez, J.3
Dietrich, S.4
-
26
-
-
84937814312
-
F5-A steganographic algorithm: High capacity despite better steganalysis
-
Moskowitz, I.S. (ed.) IH 2001. Springer, Heidelberg
-
Westfeld, A.: F5-A steganographic algorithm: High capacity despite better steganalysis. In: Moskowitz, I.S. (ed.) IH 2001. LNCS, vol. 2137, pp. 289-302. Springer, Heidelberg (2001)
-
(2001)
LNCS
, vol.2137
, pp. 289-302
-
-
Westfeld, A.1
-
27
-
-
84892764719
-
Attacks on steganographic systems
-
Pfitzmann, A. (ed.) IH 1999. Springer, Heidelberg
-
Westfeld, A., Pfitzmann, A.: Attacks on steganographic systems. In: Pfitzmann, A. (ed.) IH 1999. LNCS, vol. 1768, pp. 61-75. Springer, Heidelberg (2000)
-
(2000)
LNCS
, vol.1768
, pp. 61-75
-
-
Westfeld, A.1
Pfitzmann, A.2
-
28
-
-
49949094072
-
Traffic aggregation for malware detection
-
Zamboni, D. (ed.) DIMVA 2008. Springer, Heidelberg
-
Yen, T.-F., Reiter, M.K.: Traffic aggregation for malware detection. In: Zamboni, D. (ed.) DIMVA 2008. LNCS, vol. 5137, pp. 207-227. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.5137
, pp. 207-227
-
-
Yen, T.-F.1
Reiter, M.K.2
-
29
-
-
10044282531
-
On estimation of secret message length in jsteg-like steganography
-
Yu, X., Wang, Y., Tan, T.: On estimation of secret message length in jsteg-like steganography. In: International Conference on Pattern Recognition, vol. 4, pp. 673-676 (2004)
-
(2004)
International Conference on Pattern Recognition
, vol.4
, pp. 673-676
-
-
Yu, X.1
Wang, Y.2
Tan, T.3
|