Found 19 results
Filters: Author is Moskowitz, Ira S  [Clear All Filters]
2005
Ahmed, F., and I. S. Moskowitz, "Composite Signature Based Watermarking for Fingerprint Authentication", ACM Multimedia and Security Workshop, ACM2005 , New York City, New York, 2005. AhmedMoskowitz2005.pdf (486.33 KB)
Moskowitz, I. S., and R. Newman, "Multiple Access Covert Channels", IASTED CNIS 2005, Phoenix, Arizona, 2005. MoskowitzNewman2005.pdf (2.33 MB)
Kang, M., I. S. Moskowitz, and S. Chincheck, "The Pump: A Decade of Covert Fun", 21st Annual Computer Security Applications Conference, 2005. Kang etal 2005.pdf (535.23 KB)
2003
Tracy, J., LW. Chang, and I. S. Moskowitz, "An Agent-based Approach to Inference Prevention in Distributed Database Systems", International Journal on Artificial Intelligence Tools, vol. 12, issue 3, pp. 297-314, 2003. Tracy etal2003.pdf (220.93 KB)
Moskowitz, I. S., R. Newman, A. R. Miller, and D. P. Crepeau, "Covert Channels and Anonymizing Networks", WPES'03, Washington, D.C., 2003. Moskowitz etal2003b.pdf (356.86 KB)
Newman, R., I. S. Moskowitz, P. Syverson, and A. Serjantov, "Metrics for Traffic Analysis Prevention", PET 2003 Workshop on Privacy Enhancing Technologies, Dresden, Germany, 2003. Newman etal2003.pdf (218.12 KB)
Moskowitz, I. S., R. Newman, and P. Syverson, "Quasi-Anonymous Channels", CNIS 2003, New York City, New York, 2003. Moskowitz etal2003.pdf (60.86 KB)
2002
Tracy, J., LW. Chang, and I. S. Moskowitz, "An Agent-based Approach to Inference Prevention in Distributed Database Systems", 14th IEEE International Conference on Tools with Artificial Intelligence, Washington, D.C., pp. 413-422, 2002. Tracy etal2002.pdf (220.93 KB)
Moskowitz, I. S., LW. Chang, and R. Newman, "Capacity is the Wrong Paradigm", New Security Paradigms Workshop (NSPW), Virginia Beach, Virginia, 2002. Moskowitz etal2002b.pdf (247.04 KB)
Moskowitz, I. S., N. F. Johnson, and M. Jacobs, "A Detection Study of an NRL Steganographic Method", NRL Memorandum Report, no. NRL/MR/554002-8635, 2002. Moskowitz etal2002.pdf (14.22 MB)
Newman, R., I. S. Moskowitz, LW. Chang, and M. M. Brahmadesam, "A Steganographic Embedding Undetectable by JPEG Compatibility Steganalysis", Information Hiding, 2002. Newman etal2002.pdf (251.68 KB)
Chang, LW., and I. S. Moskowitz, "A Study of Inference Problems in Distributed Databases", IFIP 11.3 WG in Data Security and Applications, Kings College, UK, 2002. ChangMoskowitz2002.pdf (256.28 KB)
2001
Chang, LW., and I. S. Moskowitz, "A Bayesian Network Schema for Lessoning Database Inference", International Conference on Computational Intelligence for Modeling, Control and Automation, Las Vegas, Nevada, 2001. ChangMoskowitz2001.pdf (151.37 KB)
Moskowitz, I. S., M. Kang, LW. Chang, and G. E. Longdon, "Randomly Roving Agents for Intrusion Detection", 15th IFIP WG 11.3 Working Conference on Database and Application Security, Niagra on the Lake, Canada, Kluwer Press, 2001. Moskowitz etal2001.pdf (257.73 KB)
2000
Moskowitz, I. S., G. E. Longdon, and LW. Chang, "A New Paradigm Hidden in Steganography", New Security Paradigms Workshop, Cork, Ireland, Ballycotton, Co., 2000. Moskowitz etal2000.pdf (247.73 KB)