Skip to main content
Top

Annals of Telecommunications

Issue 7-8/2014

Content (11 Articles)

Open Access Editorial

Network forensics and challenges for cybersecurity

Wojciech Mazurczyk, Krzysztof Szczypiorski, Hui Tian

3G IP Multimedia Subsystem based framework for lawful interception

Dohoon Kim, Jungbean Lee, Young-Gab Kim, Byungsik Yoon, Hoh Peter In

Open Access

On the testing of network cyber threat detection methods on spam example

Robert Filasiak, Maciej Grzenda, Marcin Luckner, Pawel Zawistowski

Cheetah: a space-efficient HNB-based NFAT approach to supporting network forensics

Bo-Chao Cheng, Guo-Tan Liao, Hsu-Chen Huang, Ping-Hai Hsu

Efficient searchable ID-based encryption with a designated server

Tsu-Yang Wu, Tung-Tso Tsai, Yuh-Min Tseng

Hidden and under control

Steffen Wendzel, Jörg Keller

Adaptive JPEG steganography with new distortion function

Fengyong Li, Xinpeng Zhang, Jiang Yu, Wenfeng Shen

Open Access

Steganalysis of transcoding steganography

Artur Janicki, Wojciech Mazurczyk, Krzysztof Szczypiorski

Current Publications

scroll for more

use your arrow keys for more

scroll or use arrow keys for more

Premium Partner