Author of the publication

Characterization of steganographic algorithms using software metrics.

. Security, Steganography, and Watermarking of Multimedia Contents, volume 5681 of Proceedings of SPIE, page 264-274. SPIE, (2005)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Application of conditional entropy measures to steganalysis., , , and . Security, Steganography, and Watermarking of Multimedia Contents, volume 6072 of SPIE Proceedings, page 607204. SPIE, (2006)Misuse, Abuse and Reuse: Economic Utility Functions for Characterising Security Requirements., and . ARES, page 572-581. IEEE Computer Society, (2016)A case for the economics of secure software development., and . NSPW, page 92-105. ACM, (2016)Cyber-Threats Information Sharing in Cloud Computing: A Game Theoretic Approach., , , , , and . CSCloud, page 382-389. IEEE Computer Society, (2015)Policy, Statistics, and Questions: Reflections on UK Cyber Security Disclosures., and . WEIS, (2015)A government perspective on digital data embedding: taking a systems approach.. MM&Sec, page 77-78. ACM, (2005)When the Winning Move is Not to Play: Games of Deterrence in Cyber Security., , and . GameSec, volume 9406 of Lecture Notes in Computer Science, page 250-269. Springer, (2015)Characterization of steganographic algorithms using software metrics.. Security, Steganography, and Watermarking of Multimedia Contents, volume 5681 of Proceedings of SPIE, page 264-274. SPIE, (2005)Policy, statistics and questions: Reflections on UK cyber security disclosures., and . J. Cybersecur., 2 (1): 43-56 (2016)Software Security Investment: The Right Amount of a Good Thing., and . SecDev, page 53-59. IEEE Computer Society, (2016)