The subworld concept lexicon and the lexicon management system
Computational Linguistics - Special issue of the lexicon
OPUS: preventing weak password choices
Computers and Security
What is a secret—and—what does that have to do with computer security?
NSPW '94 Proceedings of the 1994 workshop on New security paradigms
A requires/provides model for computer attacks
Proceedings of the 2000 workshop on New security paradigms
Universal grammar and lexis for quick ramp-up of MT systems
COLING '98 Proceedings of the 17th international conference on Computational linguistics - Volume 2
Ontology in information security: a useful theoretical foundation and methodological tool
Proceedings of the 2001 workshop on New security paradigms
Natural Language Watermarking: Design, Analysis, and a Proof-of-Concept Implementation
IHW '01 Proceedings of the 4th International Workshop on Information Hiding
Natural Language Watermarking and Tamperproofing
IH '02 Revised Papers from the 5th International Workshop on Information Hiding
Fingerprinting Text in Logical Markup Languages
ISC '01 Proceedings of the 4th International Conference on Information Security
COLING-Roadmap '02 Proceedings of the 2002 COLING workshop: A roadmap for computational linguistics - Volume 13
MM&Sec '06 Proceedings of the 8th workshop on Multimedia and security
Words are not enough: sentence level natural language watermarking
Proceedings of the 4th ACM international workshop on Contents protection and security
SS'07 Proceedings of 16th USENIX Security Symposium on USENIX Security Symposium
Natural language watermarking via morphosyntactic alterations
Computer Speech and Language
Disappearing Cryptography: Information Hiding: Steganography & Watermarking
Disappearing Cryptography: Information Hiding: Steganography & Watermarking
Empirical Paraphrasing of Modern Greek Text in Two Phases: An Application to Steganography
CICLing '09 Proceedings of the 10th International Conference on Computational Linguistics and Intelligent Text Processing
Semantic forensics: an application of ontological semantics to information assurance
TextMean '04 Proceedings of the 2nd Workshop on Text Meaning and Interpretation
Linguistic steganography using automatically generated paraphrases
HLT '10 Human Language Technologies: The 2010 Annual Conference of the North American Chapter of the Association for Computational Linguistics
Practical linguistic steganography using contextual synonym substitution and vertex colour coding
EMNLP '10 Proceedings of the 2010 Conference on Empirical Methods in Natural Language Processing
Ontological semantic technology for detecting insider threat and social engineering
Proceedings of the 2010 workshop on New security paradigms
Steganalysis against substitution-based linguistic steganography based on context clusters
Computers and Electrical Engineering
A natural language watermarking based on chinese syntax
ICNC'05 Proceedings of the First international conference on Advances in Natural Computation - Volume Part III
Detection of substitution-based linguistic steganography by relative frequency analysis
Digital Investigation: The International Journal of Digital Forensics & Incident Response
Text split-based steganography in OOXML format documents for covert communication
Security and Communication Networks
t-Plausibility: Generalizing Words to Desensitize Text
Transactions on Data Privacy
Copyright for web content using invisible text watermarking
Computers in Human Behavior
Content-Based Web Watermarking
International Journal of Knowledge Society Research
Hi-index | 0.00 |