Covert Channel Forensics on the Internet: Issues, Approaches, and Experiences
暂无分享,去创建一个
[1] Butler W. Lampson,et al. A note on the confinement problem , 1973, CACM.
[2] Alfred Glossbrenner,et al. Google and Other Search Engines , 2004 .
[3] J. Andel. Sequential Analysis , 2022, The SAGE Encyclopedia of Research Design.
[4] P. S. Tasker,et al. DEPARTMENT OF DEFENSE TRUSTED COMPUTER SYSTEM EVALUATION CRITERIA , 1985 .
[5] Gustavus J. Simmons,et al. The Prisoners' Problem and the Subliminal Channel , 1983, CRYPTO.
[6] Rajarathnam Chandramouli,et al. A mathematical framework for active steganalysis , 2003, Multimedia Systems.
[7] Michèle Basseville,et al. Detection of abrupt changes , 1993 .
[8] Rafael Alonso,et al. SmartSearch steganalysis , 2003, Security and Watermarking of Multimedia Contents.
[9] Rajarathnam Chandramouli,et al. Active steganalysis of sequential steganography , 2003, IS&T/SPIE Electronic Imaging.
[10] Rajarathnam Chandramouli. Web search steganalysis: some challenges and approaches , 2004, 2004 IEEE International Symposium on Circuits and Systems (IEEE Cat. No.04CH37512).