Author of the publication

Multi-Carrier Steganographic Algorithm Using File Fragmentation of FAT FS.

, , , , , and . Comput. Informatics, 38 (2): 343-366 (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Multi-Carrier Steganographic Algorithm Using File Fragmentation of FAT FS., , , , , and . Comput. Informatics, 38 (2): 343-366 (2019)Intrusion Detection Architecture Utilizing Graphics Processors., , and . Acta Informatica Pragensia, 1 (1): 50-59 (2012)Comparison of Filter Techniques for Two-Step Feature Selection., , , , , , , , and . Comput. Informatics, 36 (3): 597-617 (2017)Distributed Detection System of Security Intrusions Based on Partially Ordered Events and Patterns., , and . Towards Intelligent Engineering and Information Technology, volume 243 of Studies in Computational Intelligence, Springer, (2009)Securing Distributed Computer Systems Using an Advanced Sophisticated Hybrid Honeypot Technology., , , , , , and . Comput. Informatics, 36 (1): 113-139 (2017)Agent-Based Model of the Spectrum Auctions with Sensing Imperfections in Dynamic Spectrum Access Networks., , , , , , , , and . Comput. Informatics, 36 (5): 1041-1062 (2017)Android Access Control Extension., , and . Acta Informatica Pragensia, 4 (3): 310-317 (2015)Information Hiding into OBJ Format File Using Vector Steganography Techniques., , , and . SACI, page 91-96. IEEE, (2018)Security sandbox based on RBAC model., , and . SACI, page 75-80. IEEE, (2016)