345 | -- | 346 | Wojciech Mazurczyk, Krzysztof Szczypiorski, Hui Tian. Network forensics and challenges for cybersecurity |
347 | -- | 361 | Do-Hoon Kim, Jungbean Lee, Young-Gab Kim, Byungsik Yoon, Hoh Peter In. 3G IP Multimedia Subsystem based framework for lawful interception |
363 | -- | 377 | Robert Filasiak, Maciej Grzenda, Marcin Luckner, Pawel Zawistowski. On the testing of network cyber threat detection methods on spam example |
379 | -- | 389 | Bo-Chao Cheng, Guo-Tan Liao, Hsu-Chen Huang, Ping-Hai Hsu. Cheetah: a space-efficient HNB-based NFAT approach to supporting network forensics |
391 | -- | 402 | Tsu-Yang Wu, Tung-Tso Tsai, Yuh-Min Tseng. Efficient searchable ID-based encryption with a designated server |
403 | -- | 416 | Weiwei Liu, Guangjie Liu, Yuewei Dai. Syndrome trellis codes based on minimal span generator matrix |
417 | -- | 430 | Steffen Wendzel, Jörg Keller. Hidden and under control - A survey and outlook on covert channel-internal control protocols |
431 | -- | 440 | Fengyong Li, Xinpeng Zhang, Jiang Yu, Wenfeng Shen. Adaptive JPEG steganography with new distortion function |
441 | -- | 447 | Xinpeng Zhang, Chuan Qin, Liquan Shen. Efficient wet paper embedding for steganography with multilayer construction |
449 | -- | 460 | Artur Janicki, Wojciech Mazurczyk, Krzysztof Szczypiorski. Steganalysis of transcoding steganography |
461 | -- | 473 | Songbin Li, Haojiang Deng, Hui Tian, Qiongxing Dai. Steganalysis of prediction mode modulated data-hiding algorithms in H.264/AVC video stream |