Seguir
Lisa M. Marvel
Lisa M. Marvel
Email confirmado em mail.mil
Título
Citado por
Citado por
Ano
Spread spectrum image steganography
LM Marvel, CG Boncelet, CT Retter
IEEE Transactions on image processing 8 (8), 1075-1083, 1999
9511999
Spread spectrum image steganography
CG Boncelet Jr, LM Marvel, CT Retter
US Patent 6,557,103, 2003
2262003
Reliable blind information hiding for images
LM Marvel, CG Boncelet, CT Retter
Information Hiding: Second International Workshop, IH’98 Portland, Oregon …, 1998
781998
{Off-Path}{TCP} Exploits: Global Rate Limit Considered Dangerous
Y Cao, Z Qian, Z Wang, T Dao, SV Krishnamurthy, LM Marvel
25th USENIX Security Symposium (USENIX Security 16), 209-225, 2016
682016
Malicious co-residency on the cloud: Attacks and defense
AOF Atya, Z Qian, SV Krishnamurthy, T La Porta, P McDaniel, L Marvel
IEEE INFOCOM 2017-IEEE Conference on Computer Communications, 1-9, 2017
652017
Towards self-healing smartphone software via automated patching
MT Azim, I Neamtiu, LM Marvel
Proceedings of the 29th ACM/IEEE international conference on Automated …, 2014
632014
Compression-compatible fragile and semifragile tamper detection
LM Marvel, GW Hartwig Jr, CG Boncelet Jr
Security and Watermarking of Multimedia Contents II 3971, 131-139, 2000
622000
Hiding information in images
LM Marvel, CT Retter, CG Boncelet
Proceedings 1998 International Conference on Image Processing. ICIP98 (Cat …, 1998
621998
Cybervan: A cyber security virtual assured network testbed
R Chadha, T Bowen, CYJ Chiang, YM Gottlieb, A Poylisher, A Sapello, ...
MILCOM 2016-2016 IEEE Military Communications Conference, 1125-1130, 2016
582016
A methodology for data hiding using images
LM Marvel, CT Retter, CG Boncelet
IEEE Military Communications Conference. Proceedings. MILCOM 98 (Cat. No …, 1998
581998
Image steganography for hidden communication
LMM Marvel
University of Delaware, 1999
521999
ACyDS: An adaptive cyber deception system
CYJ Chiang, YM Gottlieb, SJ Sugrim, R Chadha, C Serban, A Poylisher, ...
MILCOM 2016-2016 IEEE Military Communications Conference, 800-805, 2016
502016
Catch me if you can: A closer look at malicious co-residency on the cloud
AOF Atya, Z Qian, SV Krishnamurthy, T La Porta, P McDaniel, LM Marvel
IEEE/ACM Transactions on Networking 27 (2), 560-576, 2019
272019
Off-path TCP exploits of the challenge ACK global rate limit
Y Cao, Z Qian, Z Wang, T Dao, SV Krishnamurthy, LM Marvel
IEEE/ACM Transactions on Networking 26 (2), 765-778, 2018
252018
Using XACML for embedded and fine-grained access control policy
G Hsieh, K Foster, G Emamali, G Patrick, L Marvel
2009 International Conference on Availability, Reliability and Security, 462-468, 2009
252009
Methodology of Spread-Spectrum Image Steganography
LM Marvel, CG Boncelet, CT Retter
Army research lab Aberdeen proving ground MD, Tech. Rep, 1998
211998
System and method for image tamper detection via thumbnail hiding
LM Marvel, GW Hartwig Jr
US Patent 6,831,990, 2004
202004
Security and science of agility
P McDaniel, T Jaeger, TF La Porta, N Papernot, RJ Walls, A Kott, L Marvel, ...
Proceedings of the First ACM Workshop on Moving Target Defense, 13-19, 2014
192014
Implementation of Spread Spectrum Image Steganography
FS Brundick, LM Marvel
Army Research Laboratory, 2001
192001
The use of side information in image steganography
LM Marvel, CT Retter
International Symposium on Information Theory and Its Applications, Honolulu …, 2000
172000
O sistema não pode efectuar a operação agora. Tente mais tarde.
Artigos 1–20