Follow

Submissions from 2019

PDF

A new network model for cyber threat intelligence sharing using blockchain technology, Daire Homan, Ian Shiel, and Christina Thorpe

Submissions from 2017

PDF

Improving the Stealthiness of DNS-Based Covert Communication, Stephen Sheridan and Anthony Keane

Submissions from 2015

PDF

Detection of DNS Based Covert Channels, Stephen Sheridan and Anthony Keane

Submissions from 2013

PDF

Robust Digital Video Watermarking using Reversible Data Hiding and Visual Cryptography, Manoj Kumar and Arnold Hensman