Follow
Lisa M. Marvel
Lisa M. Marvel
Verified email at mail.mil
Title
Cited by
Cited by
Year
Spread spectrum image steganography
LM Marvel, CG Boncelet, CT Retter
IEEE Transactions on image processing 8 (8), 1075-1083, 1999
9701999
Spread spectrum image steganography
CG Boncelet Jr, LM Marvel, CT Retter
US Patent 6,557,103, 2003
2292003
Reliable blind information hiding for images
LM Marvel, CG Boncelet, CT Retter
Information Hiding: Second International Workshop, IH’98 Portland, Oregon …, 1998
781998
{Off-Path}{TCP} Exploits: Global Rate Limit Considered Dangerous
Y Cao, Z Qian, Z Wang, T Dao, SV Krishnamurthy, LM Marvel
25th USENIX Security Symposium (USENIX Security 16), 209-225, 2016
732016
Malicious co-residency on the cloud: Attacks and defense
AOF Atya, Z Qian, SV Krishnamurthy, T La Porta, P McDaniel, L Marvel
IEEE INFOCOM 2017-IEEE Conference on Computer Communications, 1-9, 2017
692017
Cybervan: A cyber security virtual assured network testbed
R Chadha, T Bowen, CYJ Chiang, YM Gottlieb, A Poylisher, A Sapello, ...
Milcom 2016-2016 ieee military communications conference, 1125-1130, 2016
692016
Compression-compatible fragile and semifragile tamper detection
LM Marvel, GW Hartwig Jr, CG Boncelet Jr
Security and Watermarking of Multimedia Contents II 3971, 131-139, 2000
642000
Towards self-healing smartphone software via automated patching
MT Azim, I Neamtiu, LM Marvel
Proceedings of the 29th ACM/IEEE international conference on Automated …, 2014
632014
Hiding information in images
LM Marvel, CT Retter, CG Boncelet
Proceedings 1998 International Conference on Image Processing. ICIP98 (Cat …, 1998
601998
A methodology for data hiding using images
LM Marvel, CT Retter, CG Boncelet
IEEE Military Communications Conference. Proceedings. MILCOM 98 (Cat. No …, 1998
581998
ACyDS: An adaptive cyber deception system
CYJ Chiang, YM Gottlieb, SJ Sugrim, R Chadha, C Serban, A Poylisher, ...
MILCOM 2016-2016 IEEE Military Communications Conference, 800-805, 2016
532016
Image steganography for hidden communication
LMM Marvel
University of Delaware, 1999
521999
Catch me if you can: A closer look at malicious co-residency on the cloud
AOF Atya, Z Qian, SV Krishnamurthy, T La Porta, P McDaniel, LM Marvel
IEEE/ACM Transactions on Networking 27 (2), 560-576, 2019
272019
Using XACML for embedded and fine-grained access control policy
G Hsieh, K Foster, G Emamali, G Patrick, L Marvel
2009 International Conference on Availability, Reliability and Security, 462-468, 2009
272009
Off-path TCP exploits of the challenge ACK global rate limit
Y Cao, Z Qian, Z Wang, T Dao, SV Krishnamurthy, LM Marvel
IEEE/ACM Transactions on Networking 26 (2), 765-778, 2018
262018
Methodology of Spread-Spectrum Image Steganography
LM Marvel, CG Boncelet
NASA, 1998
221998
Security and science of agility
P McDaniel, T Jaeger, TF La Porta, N Papernot, RJ Walls, A Kott, L Marvel, ...
Proceedings of the First ACM Workshop on Moving Target Defense, 13-19, 2014
202014
System and method for image tamper detection via thumbnail hiding
LM Marvel, GW Hartwig Jr
US Patent 6,831,990, 2004
202004
Implementation of Spread Spectrum Image Steganography
FS Brundick, LM Marvel
Army Research Laboratory, 2001
192001
The use of side information in image steganography
LM Marvel, CT Retter
International Symposium on Information Theory and Its Applications, Honolulu …, 2000
172000
The system can't perform the operation now. Try again later.
Articles 1–20