Author:
Kamel Ibrahim,Albluwi Qutaiba
Subject
Law,General Computer Science
Reference43 articles.
1. Agrawal R, Kieman J, Srikant R, Xu Y. Hippocratic databases. In: Proceedings of very large databases (VLDB), 2002, Hong Kong, China.
2. Watermarking relational data: framework, algorithms and analysis;Agrawal;The VLDB Journal,2003
3. ADAM: a testabed for exploring the use of data mining in intrusion detection;Barbara;SIGMOD Record,2001
4. Robust audio watermarking in the time domain;Bassia;Multimedia IEEE Transaction,2001
Cited by
14 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. HSTW: A robust network flow watermarking method based on hybrid packet sequence-timing;Computers & Security;2024-04
2. Multiparty watermarking protocol based on blockchain;Multimedia Tools and Applications;2023-05-16
3. Software Watermarking: Progress and Challenges;INAE Letters;2018-10-20
4. Semantic-integrated software watermarking with tamper-proofing;Multimedia Tools and Applications;2017-11-10
5. Hidden Path: Dynamic Software Watermarking Based on Control Flow Obfuscation;22017 IEEE International Conference on Computational Science and Engineering (CSE) and IEEE International Conference on Embedded and Ubiquitous Computing (EUC);2017-07