Journal: Annales des Télécommunications

Volume 69, Issue 7-8

345 -- 346Wojciech Mazurczyk, Krzysztof Szczypiorski, Hui Tian. Network forensics and challenges for cybersecurity
347 -- 361Do-Hoon Kim, Jungbean Lee, Young-Gab Kim, Byungsik Yoon, Hoh Peter In. 3G IP Multimedia Subsystem based framework for lawful interception
363 -- 377Robert Filasiak, Maciej Grzenda, Marcin Luckner, Pawel Zawistowski. On the testing of network cyber threat detection methods on spam example
379 -- 389Bo-Chao Cheng, Guo-Tan Liao, Hsu-Chen Huang, Ping-Hai Hsu. Cheetah: a space-efficient HNB-based NFAT approach to supporting network forensics
391 -- 402Tsu-Yang Wu, Tung-Tso Tsai, Yuh-Min Tseng. Efficient searchable ID-based encryption with a designated server
403 -- 416Weiwei Liu, Guangjie Liu, Yuewei Dai. Syndrome trellis codes based on minimal span generator matrix
417 -- 430Steffen Wendzel, Jörg Keller. Hidden and under control - A survey and outlook on covert channel-internal control protocols
431 -- 440Fengyong Li, Xinpeng Zhang, Jiang Yu, Wenfeng Shen. Adaptive JPEG steganography with new distortion function
441 -- 447Xinpeng Zhang, Chuan Qin, Liquan Shen. Efficient wet paper embedding for steganography with multilayer construction
449 -- 460Artur Janicki, Wojciech Mazurczyk, Krzysztof Szczypiorski. Steganalysis of transcoding steganography
461 -- 473Songbin Li, Haojiang Deng, Hui Tian, Qiongxing Dai. Steganalysis of prediction mode modulated data-hiding algorithms in H.264/AVC video stream