Skip to Main Content Area
  • CPS-VO
    • Contact Support
  • Browse
    • Calendar
    • Announcements
    • Repositories
    • Groups
  • Search
    • Search for Content
    • Search for a Group
    • Search for People
    • Search for a Project
    • Tagcloud
      
 
Not a member?
Click here to register!
Forgot username or password?
 
Home
National Science Foundation

Cyber-Physical Systems Virtual Organization

Read-only archive of site from September 29, 2023.

CPS-VO

decoy word document

biblio

Visible to the public A Steganographic Approach to Localizing Botmasters

Submitted by BrandonB on Wed, 05/06/2015 - 10:19am
  • internet
  • Watermarking
  • Steganography
  • steganographic approach
  • Servers
  • secret cryptographic key
  • public key cryptography
  • perpetrator tracking
  • Organizations
  • object property
  • Markov processes
  • marked money bills
  • law enforcement
  • IP networks
  • IP address
  • bijective functions
  • illegal drug dealer tracking
  • honey token
  • honey net
  • encoding
  • decoy word document
  • Decoding
  • covert bits
  • Computers
  • computer security
  • computer network security
  • chaotic logistic map
  • botnets
  • botmaster machine
  • Botmaster localization

Terms of Use  |  ©2023. CPS-VO