Filter your results
- 10
- 1
- 10
- 1
- 11
- 1
- 1
- 1
- 5
- 2
- 1
- 11
- 1
- 1
- 1
- 7
- 2
- 3
- 3
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
|
|
sorted by
|
|
Video Watermarking Scheme with High Payload and Robustness against Geometric Distortion14th International Conference on Communications and Multimedia Security (CMS), Sep 2013, Magdeburg,, Germany. pp.95-104, ⟨10.1007/978-3-642-40779-6_7⟩
Conference papers
hal-01492836v1
|
||
|
Automating Video File Carving and Content Identification9th International Conference on Digital Forensics (DF), Jan 2013, Orlando, FL, United States. pp.195-212, ⟨10.1007/978-3-642-41148-9_14⟩
Conference papers
hal-01460607v1
|
||
|
Comparison of cyber attacks on services in the clearnet and darknet17th IFIP International Conference on Digital Forensics (DigitalForensics), Feb 2021, Virtual, China. pp.39-61, ⟨10.1007/978-3-030-88381-2_3⟩
Conference papers
hal-03764381v1
|
||
|
Watermark-Based Authentication and Key Exchange in Teleconferencing Systems11th IFIP TC 6/TC 11 International Conference on Communications and Multimedia Security (CMS), May 2010, Linz, Austria. pp.75-80, ⟨10.1007/978-3-642-13241-4_8⟩
Conference papers
hal-01056366v1
|
||
|
Robust Resampling Detection in Digital Images13th International Conference on Communications and Multimedia Security (CMS), Sep 2012, Canterbury, United Kingdom. pp.3-15, ⟨10.1007/978-3-642-32805-3_1⟩
Conference papers
hal-01540903v1
|
||
|
Hash-Based File Content Identification Using Distributed Systems9th International Conference on Digital Forensics (DF), Jan 2013, Orlando, FL, United States. pp.119-134, ⟨10.1007/978-3-642-41148-9_8⟩
Conference papers
hal-01460625v1
|
||
|
Detecting Computer Worms in the CloudInternational Workshop on Open Problems in Network Security (iNetSec), Jun 2011, Lucerne, Switzerland. pp.43-54, ⟨10.1007/978-3-642-27585-2_4⟩
Conference papers
hal-01481505v1
|
||
|
Data Corpora for Digital Forensics Education and Research10th IFIP International Conference on Digital Forensics (DF), Jan 2014, Vienna, Austria. pp.309-325, ⟨10.1007/978-3-662-44952-3_21⟩
Conference papers
hal-01393787v1
|
||
|
ICT Systems Security and Privacy ProtectionSpringer, AICT-471, 2016, IFIP Advances in Information and Communication Technology, 978-3-319-33629-9. ⟨10.1007/978-3-319-33630-5⟩
Books
hal-01369602v1
|
||
|
Detecting Resized Double JPEG Compressed Images – Using Support Vector Machine14th International Conference on Communications and Multimedia Security (CMS), Sep 2013, Magdeburg,, Germany. pp.113-122, ⟨10.1007/978-3-642-40779-6_9⟩
Conference papers
hal-01492837v1
|
||
|
Robust Hash Algorithms for Text14th International Conference on Communications and Multimedia Security (CMS), Sep 2013, Magdeburg,, Germany. pp.135-144, ⟨10.1007/978-3-642-40779-6_11⟩
Conference papers
hal-01492815v1
|