{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:14:56Z","timestamp":1750306496916,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":16,"publisher":"ACM","license":[{"start":{"date-parts":[[2016,2,17]],"date-time":"2016-02-17T00:00:00Z","timestamp":1455667200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2016,2,17]]},"DOI":"10.1145\/2839509.2851060","type":"proceedings-article","created":{"date-parts":[[2016,2,22]],"date-time":"2016-02-22T13:18:49Z","timestamp":1456147129000},"page":"725-725","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Detecting Insider Attacks with Video Websites using Distributed Image Steganalysis (Abstract Only)"],"prefix":"10.1145","author":[{"given":"Christopher A.","family":"Francis-Christie","sequence":"first","affiliation":[{"name":"Kennesaw State University, Marietta, GA, USA"}]}],"member":"320","published-online":{"date-parts":[[2016,2,17]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.24297\/ijct.v14i2.2084"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/MITP.2011.112"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/.39"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/MALWARE.2012.6461004"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISI.2015.7165932"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2009.390"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/CEEC.2012.6375395"},{"key":"e_1_3_2_1_8_1","first-page":"1","volume-title":"2011 IEEE 5th International Conference on , vol., no.","author":"Ramachandran R.","year":"2011","unstructured":"Ramachandran , R. ; Neelakantan , S.; Bidyarthy , A.S. , \" Behavior model for detecting data exfiltration in network environment,\" in Internet Multimedia Systems Architecture and Application (IMSAA) , 2011 IEEE 5th International Conference on , vol., no. , pp. 1 -- 5 , 12-13 Dec. 2011 doi: 10.1109\/IM-SAA.2011.6156340 10.1109\/IM-SAA.2011.6156340 Ramachandran, R.; Neelakantan, S.; Bidyarthy, A.S., \"Behavior model for detecting data exfiltration in network environment,\" in Internet Multimedia Systems Architecture and Application (IMSAA), 2011 IEEE 5th International Conference on , vol., no., pp.1--5, 12-13 Dec. 2011 doi: 10.1109\/IM-SAA.2011.6156340"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/MMUL.2015.34"},{"key":"e_1_3_2_1_10_1","first-page":"292","volume-title":"IEEE Pacific Rim Conference on, vol., no.","author":"Sabeti V.","year":"2007","unstructured":"Sabeti , V. ; Samavi , S.; Mahdavi , M. ; Shirani , S. , \"Steganalysis of Pixel- Value Differencing SteganographicMethod ,\" in Communications , Computers and Signal Processing , 2007 . PacRim 2007 . IEEE Pacific Rim Conference on, vol., no. , pp. 292 -- 295 , 22-24 Aug. 2007 doi: 10.1109\/PACRIM.2007.4313232 10.1109\/PACRIM.2007.4313232 Sabeti, V.; Samavi, S.; Mahdavi, M.; Shirani, S., \"Steganalysis of Pixel-Value Differencing SteganographicMethod,\" in Communications, Computers and Signal Processing, 2007. PacRim 2007. IEEE Pacific Rim Conference on, vol., no., pp.292--295, 22-24 Aug. 2007 doi: 10.1109\/PACRIM.2007.4313232"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/PST.2014.6890927"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/PACRIM.2007.4313232"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCKE.2012.6395377"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/MWSCAS.2005.1594256"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/IIH-MSP.2012.52"},{"key":"e_1_3_2_1_16_1","unstructured":"Brian Kevin; \"Video Steganalysis for Digital Forensics Investigation \" in University of Rhode Island DigitalCommons@URI (IIH-MSP) 2013 Open Access Dissertations January 2013   Brian Kevin; \"Video Steganalysis for Digital Forensics Investigation \" in University of Rhode Island DigitalCommons@URI (IIH-MSP) 2013 Open Access Dissertations January 2013"}],"event":{"name":"SIGCSE '16: The 47th ACM Technical Symposium on Computing Science Education","sponsor":["SIGCSE ACM Special Interest Group on Computer Science Education"],"location":"Memphis Tennessee USA","acronym":"SIGCSE '16"},"container-title":["Proceedings of the 47th ACM Technical Symposium on Computing Science Education"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2839509.2851060","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T05:48:45Z","timestamp":1750225725000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2839509.2851060"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,2,17]]},"references-count":16,"alternative-id":["10.1145\/2839509.2851060","10.1145\/2839509"],"URL":"https:\/\/doi.org\/10.1145\/2839509.2851060","relation":{},"subject":[],"published":{"date-parts":[[2016,2,17]]},"assertion":[{"value":"2016-02-17","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}