Spread spectrum image steganography LM Marvel, CG Boncelet, CT Retter IEEE Transactions on image processing 8 (8), 1075-1083, 1999 | 970 | 1999 |
Spread spectrum image steganography CG Boncelet Jr, LM Marvel, CT Retter US Patent 6,557,103, 2003 | 229 | 2003 |
Reliable blind information hiding for images LM Marvel, CG Boncelet, CT Retter Information Hiding: Second International Workshop, IH’98 Portland, Oregon …, 1998 | 78 | 1998 |
{Off-Path}{TCP} Exploits: Global Rate Limit Considered Dangerous Y Cao, Z Qian, Z Wang, T Dao, SV Krishnamurthy, LM Marvel 25th USENIX Security Symposium (USENIX Security 16), 209-225, 2016 | 73 | 2016 |
Malicious co-residency on the cloud: Attacks and defense AOF Atya, Z Qian, SV Krishnamurthy, T La Porta, P McDaniel, L Marvel IEEE INFOCOM 2017-IEEE Conference on Computer Communications, 1-9, 2017 | 69 | 2017 |
Cybervan: A cyber security virtual assured network testbed R Chadha, T Bowen, CYJ Chiang, YM Gottlieb, A Poylisher, A Sapello, ... Milcom 2016-2016 ieee military communications conference, 1125-1130, 2016 | 69 | 2016 |
Compression-compatible fragile and semifragile tamper detection LM Marvel, GW Hartwig Jr, CG Boncelet Jr Security and Watermarking of Multimedia Contents II 3971, 131-139, 2000 | 64 | 2000 |
Towards self-healing smartphone software via automated patching MT Azim, I Neamtiu, LM Marvel Proceedings of the 29th ACM/IEEE international conference on Automated …, 2014 | 63 | 2014 |
Hiding information in images LM Marvel, CT Retter, CG Boncelet Proceedings 1998 International Conference on Image Processing. ICIP98 (Cat …, 1998 | 60 | 1998 |
A methodology for data hiding using images LM Marvel, CT Retter, CG Boncelet IEEE Military Communications Conference. Proceedings. MILCOM 98 (Cat. No …, 1998 | 58 | 1998 |
ACyDS: An adaptive cyber deception system CYJ Chiang, YM Gottlieb, SJ Sugrim, R Chadha, C Serban, A Poylisher, ... MILCOM 2016-2016 IEEE Military Communications Conference, 800-805, 2016 | 53 | 2016 |
Image steganography for hidden communication LMM Marvel University of Delaware, 1999 | 52 | 1999 |
Catch me if you can: A closer look at malicious co-residency on the cloud AOF Atya, Z Qian, SV Krishnamurthy, T La Porta, P McDaniel, LM Marvel IEEE/ACM Transactions on Networking 27 (2), 560-576, 2019 | 27 | 2019 |
Using XACML for embedded and fine-grained access control policy G Hsieh, K Foster, G Emamali, G Patrick, L Marvel 2009 International Conference on Availability, Reliability and Security, 462-468, 2009 | 27 | 2009 |
Off-path TCP exploits of the challenge ACK global rate limit Y Cao, Z Qian, Z Wang, T Dao, SV Krishnamurthy, LM Marvel IEEE/ACM Transactions on Networking 26 (2), 765-778, 2018 | 26 | 2018 |
Methodology of Spread-Spectrum Image Steganography LM Marvel, CG Boncelet NASA, 1998 | 22 | 1998 |
Security and science of agility P McDaniel, T Jaeger, TF La Porta, N Papernot, RJ Walls, A Kott, L Marvel, ... Proceedings of the First ACM Workshop on Moving Target Defense, 13-19, 2014 | 20 | 2014 |
System and method for image tamper detection via thumbnail hiding LM Marvel, GW Hartwig Jr US Patent 6,831,990, 2004 | 20 | 2004 |
Implementation of Spread Spectrum Image Steganography FS Brundick, LM Marvel Army Research Laboratory, 2001 | 19 | 2001 |
The use of side information in image steganography LM Marvel, CT Retter International Symposium on Information Theory and Its Applications, Honolulu …, 2000 | 17 | 2000 |