From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Blind Linguistic Steganalysis against Translation Based Steganography., , , , и . IWDW, том 6526 из Lecture Notes in Computer Science, стр. 251-265. Springer, (2010)A novel distributed covert channel in HTTP., , , и . Secur. Commun. Networks, 7 (6): 1031-1041 (2014)A new scheme for covert communication via 3G encoded speech., , , , и . Comput. Electr. Eng., 38 (6): 1490-1501 (2012)A Novel Web Tunnel Detection Method Based on Protocol Behaviors., , , , и . SecureComm, том 127 из Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, стр. 234-251. Springer, (2013)More than Word Frequencies: Authorship Attribution via Natural Frequency Zoned Word Distribution Analysis, , , , и . CoRR, (2012)Steganalysis of Compressed Speech Based on Markov and Entropy., , , , и . IWDW, том 8389 из Lecture Notes in Computer Science, стр. 63-76. Springer, (2013)Steganalysis against substitution-based linguistic steganography based on context clusters., , , , и . Comput. Electr. Eng., 37 (6): 1071-1081 (2011)