1. Stefan Axelsson. The base-rate fallacy and the difficulty of intrusion detection. ACM Transactions on Information and System Security (TISSEC), 3(3):186--205, 2000.
2. Luke A Bauer, James K Howes IV, Sam A Markelon, Vincent Bindschaedler, and Thomas Shrimpton. Leveraging generative models for covert messaging: Challenges and tradeoffs for ?dead-drop" deployments. arXiv preprint arXiv:2110.07009, 2024.
3. Sam Burnett, Nick Feamster, and Santosh S Vempala. Chipping away at censorship firewalls with user-generated content. In USENIX Security Symposium, pages 463--468. Washington, DC, 2010.
4. An Information-Theoretic Model for Steganography
5. An information-theoretic model for steganography