Linguistic Steganography Bibliography
contains over 200 references to scholarly works on text-based steganography, organized by date and author’s name. Each reference has tags which indicate the following:

  • Application of steganography
  • Level of operations performed
  • Operations performed by algorithm
  • Linguistics area
  • Methodology
  • Miscellany

Texts for all works currently listed are available online elsewhere without charge, unless tagged “PAY”.


pdf icon
Drive-by Downloads research review summarizes 14 cybersecurity research papers that describe ways to defeat drive-by downloads. The papers are organized by whether the proposed solution executes offline, in pseudo real-time, or in true real-time.
pdf icon
Advanced Persistent Threats research review summarizes 17 cybersecurity research papers that describe systems which automatically detect Advanced Persistent Threats.
pdf icon