


default search action
Journal of Information Security and Applications, Volume 26
Volume 26, February 2016
- Qiong Wu
, Chen Zhu, Jianjun Li, Chin-Chen Chang, Zhi-Hui Wang:
A magic cube based information hiding scheme of large payload. 1-7 - Monika Sachdeva
, Krishan Kumar
, Gurvinder Singh:
A comprehensive approach to discriminate DDoS attacks from flash events. 8-22 - Maryam Mehrnezhad, Ehsan Toreini, Siamak Fayyaz Shahandashti
, Feng Hao
:
TouchSignatures: Identification of user touch actions and PINs based on mobile sensor data via JavaScript. 23-38 - Yuxuan Yao, Gaobo Yang, Xingming Sun, Leida Li:
Detecting video frame-rate up-conversion based on periodic properties of edge-intensity. 39-50

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.