Cybersecurity Research
Linguistic Steganography Bibliography contains over 200 references to scholarly works on text-based steganography, organized by date and author’s name. Each reference has tags which indicate the following:
Texts for all works currently listed are available online elsewhere without charge, unless tagged “PAY”. |
|
Drive-by Downloads research review summarizes 14 cybersecurity research papers that describe ways to defeat drive-by downloads. The papers are organized by whether the proposed solution executes offline, in pseudo real-time, or in true real-time. | |
Advanced Persistent Threats research review summarizes 17 cybersecurity research papers that describe systems which automatically detect Advanced Persistent Threats. |