Lisa M. Marvel
Lisa M. Marvel
mail.mil의 이메일 확인됨
제목
인용
인용
연도
Spread spectrum image steganography
LM Marvel, CG Boncelet, CT Retter
IEEE Transactions on image processing 8 (8), 1075-1083, 1999
8981999
Spread spectrum image steganography
CG Boncelet Jr, LM Marvel, CT Retter
US Patent 6,557,103, 2003
2212003
Reliable blind information hiding for images
LM Marvel, CG Boncelet, CT Retter
International Workshop on Information Hiding, 48-61, 1998
771998
Compression-compatible fragile and semifragile tamper detection
LM Marvel, GW Hartwig Jr, CG Boncelet Jr
Security and Watermarking of Multimedia Contents II 3971, 131-139, 2000
632000
Hiding information in images
LM Marvel, CT Retter, CG Boncelet
Proceedings 1998 International Conference on Image Processing. ICIP98 (Cat …, 1998
631998
A methodology for data hiding using images
LM Marvel, CT Retter, CG Boncelet
IEEE Military Communications Conference. Proceedings. MILCOM 98 (Cat. No …, 1998
571998
Towards self-healing smartphone software via automated patching
MT Azim, I Neamtiu, LM Marvel
Proceedings of the 29th ACM/IEEE international conference on Automated …, 2014
492014
Off-Path {TCP} Exploits: Global Rate Limit Considered Dangerous
Y Cao, Z Qian, Z Wang, T Dao, SV Krishnamurthy, LM Marvel
25th {USENIX} Security Symposium ({USENIX} Security 16), 209-225, 2016
472016
Malicious co-residency on the cloud: Attacks and defense
AOF Atya, Z Qian, SV Krishnamurthy, T La Porta, P McDaniel, L Marvel
IEEE INFOCOM 2017-IEEE Conference on Computer Communications, 1-9, 2017
452017
Image steganography for hidden communication
LMM Marvel
University of Delaware, 1999
451999
Cybervan: A cyber security virtual assured network testbed
R Chadha, T Bowen, CYJ Chiang, YM Gottlieb, A Poylisher, A Sapello, ...
MILCOM 2016-2016 IEEE Military Communications Conference, 1125-1130, 2016
352016
ACyDS: An adaptive cyber deception system
CYJ Chiang, YM Gottlieb, SJ Sugrim, R Chadha, C Serban, A Poylisher, ...
MILCOM 2016-2016 IEEE Military Communications Conference, 800-805, 2016
302016
Using XACML for embedded and fine-grained access control policy
G Hsieh, K Foster, G Emamali, G Patrick, L Marvel
2009 International Conference on Availability, Reliability and Security, 462-468, 2009
252009
System and method for image tamper detection via thumbnail hiding
LM Marvel, GW Hartwig Jr
US Patent 6,831,990, 2004
202004
Methodology of Spread-Spectrum Image Steganography
LM Marvel, CG Boncelet Jr, CT Retter
ARMY RESEARCH LAB ABERDEEN PROVING GROUND MD, 1998
181998
Security and science of agility
P McDaniel, T Jaeger, TF La Porta, N Papernot, RJ Walls, A Kott, L Marvel, ...
Proceedings of the First ACM Workshop on Moving Target Defense, 13-19, 2014
172014
The use of side information in image steganography
LM Marvel, CT Retter
International Symposium on Information Theory and Its Applications, Honolulu …, 2000
172000
Implementation of Spread Spectrum Image Steganography
FS Brundick, LM Marvel
ARMY RESEARCH LAB ABERDEEN PROVING GROUND MD ADVANCED COMPUTATIONAL AND …, 2001
152001
Catch me if you can: A closer look at malicious co-residency on the cloud
AOF Atya, Z Qian, SV Krishnamurthy, T La Porta, P McDaniel, LM Marvel
IEEE/ACM Transactions on Networking 27 (2), 560-576, 2019
142019
A theoretical exploration of the impact of packet loss on network intrusion detection
SC Smith, RJ Hammell, TW Parker, LM Marvel
15th IEEE/ACIS International Conference on Software Engineering, Artificial …, 2014
132014
현재 시스템이 작동되지 않습니다. 나중에 다시 시도해 주세요.
학술자료 1–20