2

(In)Secure Android Debugging: Security analysis and lessons learned

Year:
2019
Language:
english
File:
PDF, 3.61 MB
english, 2019
3

Cyber Crime

Year:
2016
Language:
english
File:
PDF, 70 KB
english, 2016
6

Trends in steganography

Year:
2014
Language:
english
File:
PDF, 3.87 MB
english, 2014
9

Using Software-Defined Networking for Ransomware Mitigation: The Case of CryptoWall

Year:
2016
Language:
english
File:
PDF, 222 KB
english, 2016
15

What are suspicious VoIP delays?

Year:
2012
Language:
english
File:
PDF, 468 KB
english, 2012
16

Toward network steganography detection

Year:
2012
Language:
english
File:
PDF, 183 KB
english, 2012
17

Evaluation of steganographic methods for oversized IP packets

Year:
2012
Language:
english
File:
PDF, 842 KB
english, 2012
19

Steganography in IEEE 802.11 OFDM symbols

Year:
2012
Language:
english
File:
PDF, 629 KB
english, 2012
20

On steganography in lost audio packets

Year:
2012
Language:
english
File:
PDF, 2.18 MB
english, 2012
24

On information hiding in retransmissions

Year:
2013
Language:
english
File:
PDF, 843 KB
english, 2013
25

Advances in digital media security and right management

Year:
2014
Language:
english
File:
PDF, 112 KB
english, 2014
26

Principles and overview of network steganography

Year:
2014
Language:
english
File:
PDF, 160 KB
english, 2014
28

Vice over IP

Year:
2010
Language:
english
File:
PDF, 3.99 MB
english, 2010
29

Four ways to smuggle messages through internet services

Year:
2013
Language:
english
File:
PDF, 971 KB
english, 2013