A Precise Model to Secure Systems on Ethernet Against Man-In-The-Middle Attack | 0 | 0.34 | 2021 |
Three-dimensional histogram shifting for reversible data hiding. | 3 | 0.37 | 2018 |
A novel two-dimensional histogram modification for reversible data embedding into stereo H.264 video | 8 | 0.46 | 2016 |
An Improved Matrix Encoding Steganography Algorithm Based on H.264 Video. | 0 | 0.34 | 2016 |
A Steganography Algorithm Based on ±1 DCT Coefficients for H.264/AVC | 0 | 0.34 | 2015 |
A Video Steganalysis Algorithm for H.264/AVC Based on the Markov Features | 1 | 0.36 | 2015 |
A Steganography Algorithm Using Multidimensional Coefficient Matching for H.264/AVC. | 0 | 0.34 | 2015 |
A novel P2P IPTV system for IPv4/v6 networks | 0 | 0.34 | 2014 |
A Data Hiding Algorithm For 3d Videos Based On Inter-Mbs | 1 | 0.35 | 2014 |
A robust without intra-frame distortion drift data hiding algorithm based on H.264/AVC | 5 | 0.42 | 2014 |
A robust data hiding algorithm for H.264/AVC video streams | 14 | 0.73 | 2013 |
Characterizing User Behavior in Weibo | 6 | 0.55 | 2012 |
A client/server based mechanism to prevent ARP spoofing attacks | 0 | 0.34 | 2012 |
Forward or ignore: User behavior analysis and prediction on microblogging | 5 | 0.44 | 2012 |
Reversible Data Hiding Scheme Based On H.264/AVC without Distortion Drift. | 9 | 0.55 | 2012 |
LeakProber: a framework for profiling sensitive data leakage paths | 4 | 0.41 | 2011 |
An Empirical Study of the Beezone System | 0 | 0.34 | 2011 |
Multifactor hierarchical fuzzy trust evaluation on peer-to-peer networks. | 6 | 0.48 | 2011 |
A novel real-time aggregation method on network security events. | 0 | 0.34 | 2011 |
Sina Microblog: An Information-Driven Online Social Network | 22 | 1.19 | 2011 |
A novel technique of recognising multi-stage attack behaviour | 4 | 0.54 | 2010 |
Measuring the botnet using the second character of bots | 1 | 0.34 | 2010 |
The Aggregation and Stability Analysis of Network Traffic for Structured-P2P-based Botnet Detection | 2 | 0.39 | 2010 |
Weight Based Multiple Support Vector Machine Identification of Peer-to-Peer Traffic | 0 | 0.34 | 2010 |
A Data Hiding Algorithm for H.264/AVC Video Streams Without Intra-Frame Distortion Drift | 23 | 0.97 | 2010 |
Using Simulation to Characterize Topology of Peer to Peer Botnets | 2 | 0.38 | 2009 |
An Efficient Worm Defense System Based Signature Extraction | 0 | 0.34 | 2009 |
Dynamic Forensics Based on Intrusion Tolerance | 2 | 0.41 | 2009 |
Fuzzy Decision Tree Based Inference Technology for Spam Behavior Recognition | 0 | 0.34 | 2009 |
Session-Based Tunnel Scheduling Model in Multi-link Aggregate IPSec VPN | 1 | 0.36 | 2009 |
Security Evaluation Method Based on Host Resource Availability | 0 | 0.34 | 2009 |
A Method for Spam Behavior Recognition Based on Fuzzy Decision Tree | 3 | 0.38 | 2009 |
Measuring Peer-to-Peer Botnets Using Control Flow Stability | 3 | 0.46 | 2009 |
Modeling and Analyzing Dynamic Forensics System Based on Intrusion Tolerance | 5 | 0.52 | 2009 |
Measuring Botnet Size by Using URL and Collaborative MailServers | 1 | 0.36 | 2009 |
Hierarchical Fuzzy Trust Management for Customer-to-Customer in Peer-to-Peer eCommerce | 2 | 0.38 | 2008 |
The Proposition and Certification of P2P Media Streaming Traffic Features | 0 | 0.34 | 2008 |
Design, modeling and simulation of a novel directional MAC protocol for ad hoc networks. | 0 | 0.34 | 2008 |
Mining Network Traffic for Worm Signature Extraction | 1 | 0.40 | 2008 |
A novel Network Intrusion Detection System (NIDS) based on signatures search of data mining | 9 | 0.60 | 2008 |
Managing data for evaluating trust in unstructured peer-to-peer networks | 0 | 0.34 | 2008 |
A P2P E-commerce Related Network Security Issue: P2P Worm | 0 | 0.34 | 2008 |
Fault-Tolerant Routing for P2P System with Structured Topology | 1 | 0.38 | 2008 |
The Global Synthetical Processing of Network Security Events | 1 | 0.43 | 2007 |
Assessing Attack Threat by the Probability of Following Attacks | 9 | 0.74 | 2007 |
Detecting botnets by analyzing DNS traffic | 1 | 0.35 | 2007 |
A Modified Non-Sieving Quadratic Sieve For Factoring Simple Blur Integers | 2 | 0.70 | 2007 |
A Data Mining Approach to Generating Network Attack Graph for Intrusion Prediction | 12 | 0.68 | 2007 |
Real-Time Correlation of Network Security Alerts | 16 | 0.83 | 2007 |
A Scalable Multicast Key Management To Expel A Malicious Receiver In Marks | 0 | 0.34 | 2007 |