Skip to main content
In this paper, different steganographic methods have been analyzed and implementations of those techniques have been performed. Those methods include hiding in text, hiding in audio file, hiding in file system, and hiding in image files.
    • by 
The rapid pace of technological developments in the area of information and communications technologies caused nations and peoples to be more reliant on cyber infrastructure to survive. Besides opportunities, the widespread use of... more
    • by  and +2
    •   2  
      Strategic AnalysisCyber Strategy
The widespread use of information technology transforms businesses continuously and rapidly. Information technology introduces new threats to organizations as well. Risk analysis is an important tool in order to make correct decisions... more
    • by  and +1
    •   2  
      Information SecurityAsset Valuation
Today, cyber threats have the potential to harm critical infrastructures which may result in the interruption of life-sustaining services, catastrophic economic damages or severe degradation of national security. The diversity and... more
    • by  and +1
    •   2  
      Critical infrastructure protectionCyber Threats
Sayısal ortamda işlenen bilginin artması, iş süreçlerinin sayısal ortama aktarılması ve yaygınlaşan e-devlet uygulamalarıyla birlikte sayısal ortamın ve bu ortamdaki bilginin güvenliğinin sağlanması ülke güvenliğinin göz ardı edilemez bir... more
    • by  and +1
Steganography is the art and science of writing hidden messages in such a way that no one apart from the intended recipient knows of the existence of the message. In today’s world, it is widely used in order to secure the information.... more
    • by 
    •   3  
      Computer ScienceDigital EvidenceSpectral Estimation
Today, cyber space has been embraced by individuals, organizations and nations as an indispensable instrument of daily life. Accordingly, impact of cyber threats has continuously been increasing. Critical infrastructure protection and... more
    • by 
    • National Cyber Security Strategies
Sand is a key ingredient for many industries, including concrete, glass, and electronics. Sand extraction is now exceeding fossil fuels and biomass. The absence of data on aggregates sand mining makes assessments difficult and has... more
    • by 
    • Computer Science
Steganography is the art and science of writing hidden messages in such a way that no one apart from the intended recipient knows of the existence of the message. In today's world, it is widely used in order to secure the information.... more
    • by 
    • Spectral Estimation
Cybersecurity is a concern for organizations in this era. However, strengthening the security of an organization’s internal network may not be sufficient since modern organizations depend on third parties, and these dependencies may open... more
    • by 
    • Business
In this paper, different steganographic methods have been analyzed and implementations of those techniques have been performed. Those methods include hiding in text, hiding in audio file, hiding in file system, and hiding in image files.
    • by 
    • Computer Science
Inconsistency between the way in which the law is structured, and the way in which technologies actually operate is always an interesting and useful topic to explore. When a law conflicts with a business model, the solution will often be... more
    • by 
    •   3  
      Computer ScienceLawComputer Security
The widespread use of information technology transforms businesses continuously and rapidly. Information technology introduces new threats to organizations as well. Risk analysis is an important tool in order to make correct decisions and... more
    • by 
    •   6  
      Computer ScienceInformation TechnologyInformation SecuritySecurity Management
Today, cyber space has been embraced by individuals, organizations and nations as an indispensable instrument of daily life. Accordingly, impact of cyber threats has continuously been increasing. Critical infrastructure protection and... more
    • by 
    •   3  
      Information SecurityComputer SecurityNational Cyber Security Strategies
In this paper, the details of critical infrastructure protection program of United States of America are shared by taking the cyber resilience into account. The academic and institutional studies on the concepts of cyber maturity,... more
    • by 
    •   5  
      Information SecurityCritical infrastructure protectionCritical InfrastructuresPsychological Maturity
Today, cyber threats have the potential to harm critical infrastructures which may result in the interruption of life-sustaining services, catastrophic economic damages or severe degradation of national security. The diversity and... more
    • by 
    •   6  
      BusinessInformation SecurityComputer SecurityCritical infrastructure protection
Panel #22: Acquisition Dimensions of CybersecurityNaval Postgraduate SchoolApproved for public release; distribution is unlimited
    • by 
    •   2  
      Computer Architecture and Operating SystemsCyber Risk
The rapid pace of technological developments in the area of information and communications technologies caused nations and peoples to be more reliant on cyber infrastructure to survive. Besides opportunities, the widespread use of... more
    • by 
    •   4  
      Information SecurityComputer SecurityStrategic AnalysisCyber Strategy
Sand is a key ingredient for many industries, including concrete, glass, and electronics. Sand extraction is now exceeding fossil fuels and biomass. The absence of data on aggregates sand mining makes assessments difficult and has... more
    • by 
    •   2  
      BusinessComputer Science
Cyber-attacks know no borders. Given the globally connected environment, no region or country is secure against cyber-attacks unless the entire world is secure or has cyber capabilities. Yet, whether preventive or reactive, cyber... more
    • by 
    •   3  
      BusinessComputer SecurityCritical Infrastructure