Amanote Research

Amanote Research

    RegisterSign In

Methods to Hide Malicious Codes in PowerPoint

International Journal of e-Education, e-Business, e-Management and e-Learning
doi 10.7763/ijeeee.2013.v3.284
Full Text
Open PDF
Abstract

Available in full text

Date

January 1, 2013

Authors
Jiwoong Choi
Publisher

IACSIT Press


Related search

Error Correction at Malicious Nodes Using Reed-Muller Codes

International Journal of Computer Applications
2016English

Meeting News: Nowhere to Hide

Analytical Chemistry
Analytical Chemistry
2004English

Learning to Detect Malicious URLs

ACM Transactions on Intelligent Systems and Technology
Artificial IntelligenceTheoretical Computer Science
2011English

Book Review: No Place to Hide

Journal of Digital Forensics, Security and Law
2007English

Imperfect Camouflage: How to Hide in a Variable World?

Proceedings of the Royal Society B: Biological Sciences
GeneticsMolecular BiologyEnvironmental ScienceBiochemistryMicrobiology ImmunologyBiological SciencesMedicineAgricultural
2019English

WebCom-G: Middleware to Hide the Grid

WIT Transactions on State of the Art in Science and Engineering
2006English

An Approach to Hide Data in Video Using Steganography

International Journal of Research in Engineering and Technology
2014English

Powerpoint vs. Recorded Lectures

Advances in Educational Technologies and Instructional Design
2017English

Incentivized Outsourced Computation Resistant to Malicious Contractors

IEEE Transactions on Dependable and Secure Computing
Electronic EngineeringElectricalComputer Science
2017English

Amanote Research

Note-taking for researchers

Follow Amanote

© 2025 Amaplex Software S.P.R.L. All rights reserved.

Privacy PolicyRefund Policy