Network forensics and challenges for cybersecurity Wojciech MazurczykKrzysztof SzczypiorskiHui Tian Editorial Open access 27 March 2014 Pages: 345 - 346
3G IP Multimedia Subsystem based framework for lawful interception Dohoon KimJungbean LeeHoh Peter In OriginalPaper 19 October 2013 Pages: 347 - 361
On the testing of network cyber threat detection methods on spam example Robert FilasiakMaciej GrzendaPawel Zawistowski OriginalPaper Open access 09 January 2014 Pages: 363 - 377
Cheetah: a space-efficient HNB-based NFAT approach to supporting network forensics Bo-Chao ChengGuo-Tan LiaoPing-Hai Hsu OriginalPaper 07 November 2013 Pages: 379 - 389
Efficient searchable ID-based encryption with a designated server Tsu-Yang WuTung-Tso TsaiYuh-Min Tseng OriginalPaper 24 October 2013 Pages: 391 - 402
Syndrome trellis codes based on minimal span generator matrix Weiwei LiuGuangjie LiuYuewei Dai OriginalPaper 26 July 2013 Pages: 403 - 416
Adaptive JPEG steganography with new distortion function Fengyong LiXinpeng ZhangWenfeng Shen OriginalPaper 15 January 2014 Pages: 431 - 440
Efficient wet paper embedding for steganography with multilayer construction Xinpeng ZhangChuan QinLiquan Shen OriginalPaper 21 September 2013 Pages: 441 - 447
Steganalysis of transcoding steganography Artur JanickiWojciech MazurczykKrzysztof Szczypiorski OriginalPaper Open access 20 July 2013 Pages: 449 - 460
Steganalysis of prediction mode modulated data-hiding algorithms in H.264/AVC video stream Songbin LiHaojiang DengQiongxing Dai OriginalPaper 16 July 2013 Pages: 461 - 473