Author:
Rowe Neil C.,Rrushi Julian
Publisher
Springer International Publishing
Reference13 articles.
1. Anderson F, Grossman T, Wigdor D, Fitzmaurice G (2015) Supporting subtlety with deceptive devices and illusory interactions. In: Proceedings of CHI 2015, Seoul, South Korea, 18–23 Apr 2015
2. Bashar M, Krishnan G, Kuhn, M, Spafford, E, Wagstaff, S (1997) Low-threat security patches and tools. In: Proceedings of the international conference on software maintenance, Bari, IT, 1-3 Oct, 1997. pp 306–313
3. Dang B, Gazet A, Bachaalany E, Josse S (2014) Practical reverse engineering: x86, x64, ARM, Windows kernel, reversing tools, and obfuscation. Wiley, New York
4. Ford R, Howard M (2007) How not to be seen. IEEE Security and Privacy 5(1):67–69
5. Fridich J (2009) Steganography in digital media: principles, algorithms, and applications. Cambridge University Press, Cambridge, UK