Defending passive worms in unstructured P2P networks based on healthy file dissemination. [Citation Graph (, )][DBLP]
On the development of an internetwork-centric defense for scanning worms. [Citation Graph (, )][DBLP]
A concise cost analysis of Internet malware. [Citation Graph (, )][DBLP]
Providing secure execution environments with a last line of defense against Trojan circuit attacks. [Citation Graph (, )][DBLP]
A new steganography algorithm based on color histograms for data embedding into raw video streams. [Citation Graph (, )][DBLP]
Blind image steganalysis based on content independent statistical measures maximizing the specificity and sensitivity of the system. [Citation Graph (, )][DBLP]
A schema for protecting the integrity of databases. [Citation Graph (, )][DBLP]
Design and implementation of highly reliable dual-computer systems. [Citation Graph (, )][DBLP]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP