Filter your results
- 4
- 1
- 4
- 1
- 5
- 1
- 1
- 2
- 1
- 5
- 1
- 1
- 2
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
|
|
sorted by
|
|
Detecting Resized Double JPEG Compressed Images – Using Support Vector Machine14th International Conference on Communications and Multimedia Security (CMS), Sep 2013, Magdeburg,, Germany. pp.113-122, ⟨10.1007/978-3-642-40779-6_9⟩
Conference papers
hal-01492837v1
|
||
|
Watermark-Based Authentication and Key Exchange in Teleconferencing Systems11th IFIP TC 6/TC 11 International Conference on Communications and Multimedia Security (CMS), May 2010, Linz, Austria. pp.75-80, ⟨10.1007/978-3-642-13241-4_8⟩
Conference papers
hal-01056366v1
|
||
|
Robust Resampling Detection in Digital Images13th International Conference on Communications and Multimedia Security (CMS), Sep 2012, Canterbury, United Kingdom. pp.3-15, ⟨10.1007/978-3-642-32805-3_1⟩
Conference papers
hal-01540903v1
|
||
|
Detecting Computer Worms in the CloudInternational Workshop on Open Problems in Network Security (iNetSec), Jun 2011, Lucerne, Switzerland. pp.43-54, ⟨10.1007/978-3-642-27585-2_4⟩
Conference papers
hal-01481505v1
|
||
|
ICT Systems Security and Privacy ProtectionSpringer, AICT-471, 2016, IFIP Advances in Information and Communication Technology, 978-3-319-33629-9. ⟨10.1007/978-3-319-33630-5⟩
Books
hal-01369602v1
|