Seguir
Mehdi Kharrazi
Título
Citado por
Citado por
Año
Image steganography and steganalysis: Concepts and practice
R Chandramouli, M Kharrazi, N Memon
Digital Watermarking: Second International Workshop, IWDW 2003, Seoul, Korea …, 2004
627*2004
Blind source camera identification
K Mehdi, HT Sencar, N Memon
Image Processing, 2004. ICIP'04. 2004 International Conference on 1, 709-712, 2004
479*2004
Image steganalysis with binary similarity measures
M Kharrazi, N Memon
EURASIP Journal on Advances in Signal Processing, 2749-2757, 2005
346*2005
ODISSEA: A Peer-to-Peer Architecture for Scalable Web Search and Information Retrieval.
T Suel, C Mathur, JW Wu, J Zhang, A Delis, M Kharrazi, X Long, ...
WebDB 3, 67-72, 2003
2392003
Performance study of common image steganography and steganalysis techniques
M Kharrazi, HT Sencar, N Memon
Journal of Electronic Imaging 15 (4), 041104-041104-16, 2006
1562006
Benchmarking steganographic and steganalysis techniques
M Kharrazi, HT Sencar, N Memon
Security, Steganography, and Watermarking of Multimedia Contents VII 5681 …, 2005
1012005
Cover selection for steganographic embedding
M Kharrazi, HT Sencar, N Memon
2006 International Conference on Image Processing, 117-120, 2006
1002006
Data masking: A new approach for steganography?
R Radhakrishnan, M Kharrazi, N Memon
The Journal of VLSI Signal Processing 41 (3), 293-303, 2005
762005
Improving steganalysis by fusion techniques: A case study with image steganography
M Kharrazi, HT Sencar, N Memon
Transactions on Data Hiding and Multimedia Security I, 123-137, 2006
712006
An anomaly-based botnet detection approach for identifying stealthy botnets
S Arshad, M Abbaspour, M Kharrazi, H Sanatkar
2011 IEEE International Conference on Computer Applications and Industrial …, 2011
572011
Back to static analysis for kernel-level rootkit detection
SA Musavi, M Kharrazi
IEEE Transactions on Information Forensics and Security 9 (9), 1465-1476, 2014
432014
Sencar, and Nasir Memon
M Kharrazi, T Husrev
Image steganography: Concepts and practice, 2004
302004
Improving a computer networks course using the Partov simulation engine
B Momeni, M Kharrazi
IEEE Transactions on Education 55 (3), 436-443, 2012
242012
VulSlicer: Vulnerability detection through code slicing
S Salimi, M Kharrazi
Journal of Systems and Software 193, 111450, 2022
212022
Nabs: A system for detecting resource abuses via characterization of flow content type
K Shanmugasundaram, M Kharrazi, N Memon
Computer Security Applications Conference, 2004. 20th Annual, 316-325, 2004
21*2004
Detection of fast-flux botnets through DNS traffic analysis
E Soltanaghaei, M Kharrazi
Scientia Iranica 22 (6), 2389-2400, 2015
202015
PSTEG: steganographic embedding through patching [image steganography]
K Petrowski, M Kharrazi, HT Sencar, N Memon
Proceedings.(ICASSP'05). IEEE International Conference on Acoustics, Speech …, 2005
172005
Payload Attribution via Character Dependent Multi-Bloom Filters
MH Haghighat, M Tavakoli, M Kharrazi
162013
2ploc: Preserving privacy in location-based services
AS Amoli, M Kharrazi, R Jalili
2010 IEEE Second International Conference on Social Computing, 707-712, 2010
152010
Improving real-world vulnerability characterization with vulnerable slices
S Salimi, M Ebrahimzadeh, M Kharrazi
Proceedings of the 16th ACM International Conference on Predictive Models …, 2020
122020
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20