Abstract: The rapid growth and availability of event sequence data across domains requires effective analysis and exploration methods to facilitate decision-making. Visual analytics combines ...
Abstract: Quantization index modulation (QIM) based steganography can hide secret information in voice-over-IP streams. Misuse of QIM-based steganography is a potential threat to network security.