Ausgabe 7-8/2014
Inhalt (11 Artikel)
Network forensics and challenges for cybersecurity
Wojciech Mazurczyk, Krzysztof Szczypiorski, Hui Tian
3G IP Multimedia Subsystem based framework for lawful interception
Dohoon Kim, Jungbean Lee, Young-Gab Kim, Byungsik Yoon, Hoh Peter In
On the testing of network cyber threat detection methods on spam example
Robert Filasiak, Maciej Grzenda, Marcin Luckner, Pawel Zawistowski
Cheetah: a space-efficient HNB-based NFAT approach to supporting network forensics
Bo-Chao Cheng, Guo-Tan Liao, Hsu-Chen Huang, Ping-Hai Hsu
Efficient searchable ID-based encryption with a designated server
Tsu-Yang Wu, Tung-Tso Tsai, Yuh-Min Tseng
Adaptive JPEG steganography with new distortion function
Fengyong Li, Xinpeng Zhang, Jiang Yu, Wenfeng Shen
Efficient wet paper embedding for steganography with multilayer construction
Xinpeng Zhang, Chuan Qin, Liquan Shen
Steganalysis of transcoding steganography
Artur Janicki, Wojciech Mazurczyk, Krzysztof Szczypiorski
Steganalysis of prediction mode modulated data-hiding algorithms in H.264/AVC video stream
Songbin Li, Haojiang Deng, Hui Tian, Qiongxing Dai