Author of the publication

Transform domain steganography detection using fuzzy inference systems.

, , and . ISMSE, page 286-291. IEEE Computer Society, (2004)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Fair Scheduling in Wireless Networks with Controlled Compensation for Faulty Channels., and . International Conference on Internet Computing, page 203-208. CSREA Press, (2005)A Packet Fair Queueing Algorithm with Controlled Compensation for Wireless TCP/IP Networks., and . IMSA, page 1-6. IASTED/ACTA Press, (2005)Taking a Lesson from Stealthy Rootkits., and . IEEE Secur. Priv., 2 (4): 38-45 (2004)Transform domain steganography detection using fuzzy inference systems., , and . ISMSE, page 286-291. IEEE Computer Society, (2004)An agent based certificate revocation scheme for public key management in mobile and wireless adhoc networks., and . IMSA, page 132-136. IASTED/ACTA Press, (2006)Self-healing mechanisms for kernel system compromises., , and . WOSS, page 100-104. ACM, (2004)Volatile Memory Computer Forensics to Detect Kernel Level Compromise., and . ICICS, volume 3269 of Lecture Notes in Computer Science, page 158-170. Springer, (2004)An ant colony optimization model for wireless ad-hoc network autoconfiguration., and . SMC, page 103-108. IEEE, (2005)Autonomous State Inference for Data-Driven Optimization of Neural Modulation., , , , , , , and . NER, page 950-953. IEEE, (2021)Automated Detection of Evoked Potentials Produced by Intracranial Electrical Stimulation., , , , , , , , and . NER, page 1-4. IEEE, (2023)