Research on Steganalysis for Text Steganography Based on Font Format
暂无分享,去创建一个
[1] Edward J. Delp,et al. Attacks on lexical natural language steganography systems , 2006, Electronic Imaging.
[2] Nasir D. Memon,et al. Steganalysis of audio based on audio quality metrics , 2003, IS&T/SPIE Electronic Imaging.
[3] Jessica J. Fridrich,et al. Quantitative steganalysis of digital images: estimating the secret message length , 2003, Multimedia Systems.
[4] Shawn A. Butler. Security attribute evaluation method: a cost-benefit approach , 2002, ICSE '02.
[5] C. Goth. The ins and outs of IT outsourcing , 1999 .
[6] Yang Yi-xian. Research on the detecting algorithm of text document information hiding , 2004 .
[7] Giorgio Gallo,et al. Directed Hypergraphs and Applications , 1993, Discret. Appl. Math..
[8] Ahmad-Reza Sadeghi,et al. Property-based attestation for computing platforms: caring about properties, not mechanisms , 2004, NSPW '04.
[9] Hui Luo,et al. A Steganalysis Method Based on the Distribution of First Letters of Words , 2006, 2006 International Conference on Intelligent Information Hiding and Multimedia.
[10] Steven H. Low,et al. Copyright protection for the electronic distribution of text documents , 1999, Proc. IEEE.
[11] Bharat B. Madan,et al. A method for modeling and quantifying the security attributes of intrusion tolerant systems , 2004, Perform. Evaluation.
[12] Mario Piattini,et al. PWSSec: Process for Web Services Security , 2006, 2006 IEEE International Conference on Web Services (ICWS'06).
[13] Wolfgang Emmerich,et al. The monitorability of service-level agreements for application-service provision , 2007, WOSP '07.
[14] Vijayalakshmi Atluri,et al. Security for Workflow Systems , 2008, Handbook of Database Security.
[15] Elisa Bertino,et al. The specification and enforcement of authorization constraints in workflow management systems , 1999, TSEC.
[16] Siwei Lyu,et al. Detecting Hidden Messages Using Higher-Order Statistics and Support Vector Machines , 2002, Information Hiding.
[17] Jan H. P. Eloff,et al. Designing role hierarchies for access control in workflow systems , 2001, 25th Annual International Computer Software and Applications Conference. COMPSAC 2001.
[18] Pradeep Kumar Ray,et al. Evaluation methodology for the security of e-finance systems , 2005, 2005 IEEE International Conference on e-Technology, e-Commerce and e-Service.
[19] Joon S. Park,et al. Access control mechanisms for inter-organizational workflow , 2001, SACMAT '01.
[20] Vladimir N. Vapnik,et al. The Nature of Statistical Learning Theory , 2000, Statistics for Engineering and Information Science.
[21] Corinna Cortes,et al. Support-Vector Networks , 1995, Machine Learning.
[22] Ronda R. Henning,et al. Security service level agreements: quantifiable security for the enterprise? , 1999, NSPW '99.
[23] Andreas Schaad,et al. A model-checking approach to analysing organisational controls in a loan origination process , 2006, SACMAT '06.