default search action
Mark Stamp 0001
Person information
- affiliation: San Jose State University, Department of Computer Science, CA, USA
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j63]Vrinda Malhotra, Katerina Potika, Mark Stamp:
A comparison of graph neural networks for malware classification. J. Comput. Virol. Hacking Tech. 20(1): 53-69 (2024) - [j62]Ritik Mehta, Olha Jurecková, Mark Stamp:
A natural language processing approach to Malware classification. J. Comput. Virol. Hacking Tech. 20(1): 173-184 (2024) - [j61]Olha Jurecková, Martin Jurecek, Mark Stamp, Fabio Di Troia, Róbert Lórencz:
Classification and online clustering of zero-day malware. J. Comput. Virol. Hacking Tech. 20(4): 579-592 (2024) - [j60]Matous Kozák, Martin Jurecek, Mark Stamp, Fabio Di Troia:
Creating valid adversarial examples of malware. J. Comput. Virol. Hacking Tech. 20(4): 607-621 (2024) - [j59]Pavla Louthánová, Matous Kozák, Martin Jurecek, Mark Stamp, Fabio Di Troia:
A comparison of adversarial malware generators. J. Comput. Virol. Hacking Tech. 20(4): 623-639 (2024) - [j58]Anant Shukla, Martin Jurecek, Mark Stamp:
Social media bot detection using Dropout-GAN. J. Comput. Virol. Hacking Tech. 20(4): 669-680 (2024) - [i43]Olha Jurecková, Martin Jurecek, Mark Stamp:
Online Clustering of Known and Emerging Malware Families. CoRR abs/2405.03298 (2024) - [i42]Gauri Anil Godghase, Rishit Agrawal, Tanush Obili, Mark Stamp:
Distinguishing Chatbot from Human. CoRR abs/2408.04647 (2024) - 2023
- [j57]Nhien Rust-Nguyen, Shruti Sharma, Mark Stamp:
Darknet traffic classification and adversarial attacks using machine learning. Comput. Secur. 127: 103098 (2023) - [j56]Yashna Peerthum, Mark Stamp:
An empirical analysis of the shift and scale parameters in BatchNorm. Inf. Sci. 637: 118951 (2023) - [j55]Aparna Sunil Kale, Vinay Pandya, Fabio Di Troia, Mark Stamp:
Malware classification with Word2Vec, HMM2Vec, BERT, and ELMo. J. Comput. Virol. Hacking Tech. 19(1): 1-16 (2023) - [j54]Huy Nguyen, Fabio Di Troia, Genya Ishigaki, Mark Stamp:
Generative adversarial networks and image-based malware classification. J. Comput. Virol. Hacking Tech. 19(4): 579-595 (2023) - [i41]Vrinda Malhotra, Katerina Potika, Mark Stamp:
A Comparison of Graph Neural Networks for Malware Classification. CoRR abs/2303.12812 (2023) - [i40]Yashna Peerthum, Mark Stamp:
An Empirical Analysis of the Shift and Scale Parameters in BatchNorm. CoRR abs/2303.12818 (2023) - [i39]Matous Kozák, Martin Jurecek, Mark Stamp, Fabio Di Troia:
Creating Valid Adversarial Examples of Malware. CoRR abs/2306.13587 (2023) - [i38]Lei Zhang, Dong Li, Olha Jurecková, Mark Stamp:
Steganographic Capacity of Deep Learning Models. CoRR abs/2306.17189 (2023) - [i37]Brooke Dalton, Mark Stamp:
Classifying World War II Era Ciphers with Machine Learning. CoRR abs/2307.00501 (2023) - [i36]Atharva Sharma, Martin Jurecek, Mark Stamp:
Keystroke Dynamics for User Identification. CoRR abs/2307.05529 (2023) - [i35]Aditya Raghavan, Fabio Di Troia, Mark Stamp:
Hidden Markov Models with Random Restarts vs Boosting for Malware Detection. CoRR abs/2307.10256 (2023) - [i34]Ritik Mehta, Olha Jurecková, Mark Stamp:
A Natural Language Processing Approach to Malware Classification. CoRR abs/2307.11032 (2023) - [i33]Pavla Louthánová, Matous Kozák, Martin Jurecek, Mark Stamp:
A Comparison of Adversarial Learning Techniques for Malware Detection. CoRR abs/2308.09958 (2023) - [i32]Rishit Agrawal, Kelvin Jou, Tanush Obili, Daksh Parikh, Samarth Prajapati, Yash Seth, Charan Sridhar, Nathan Zhang, Mark Stamp:
On the Steganographic Capacity of Selected Learning Models. CoRR abs/2308.15502 (2023) - [i31]Anant Shukla, Martin Jurecek, Mark Stamp:
Social Media Bot Detection using Dropout-GAN. CoRR abs/2311.05079 (2023) - [i30]Anish Singh Shekhawat, Fabio Di Troia, Mark Stamp:
Feature Analysis of Encrypted Malicious Traffic. CoRR abs/2312.04596 (2023) - 2022
- [c23]Katrina Tran, Fabio Di Troia, Mark Stamp:
Robustness of Image-Based Malware Analysis. SVCC 2022: 3-21 - [i29]Anusha Damodaran, Fabio Di Troia, Corrado Aaron Visaggio, Thomas H. Austin, Mark Stamp:
A Comparison of Static, Dynamic, and Hybrid Analysis for Malware Detection. CoRR abs/2203.09938 (2022) - [i28]Tazmina Sharmin, Fabio Di Troia, Katerina Potika, Mark Stamp:
Convolutional Neural Networks for Image Spam Detection. CoRR abs/2204.01710 (2022) - [i27]Andrew Miller, Fabio Di Troia, Mark Stamp:
Hidden Markov Models with Momentum. CoRR abs/2206.04057 (2022) - [i26]Nhien Rust-Nguyen, Mark Stamp:
Darknet Traffic Classification and Adversarial Attacks. CoRR abs/2206.06371 (2022) - [i25]Huy Nguyen, Fabio Di Troia, Genya Ishigaki, Mark Stamp:
Generative Adversarial Networks and Image-Based Malware Classification. CoRR abs/2207.00421 (2022) - [i24]Samanvitha Basole, Fabio Di Troia, Mark Stamp:
Multifamily Malware Models. CoRR abs/2207.00620 (2022) - [i23]Eric Liang, Mark Stamp:
Predicting Pedestrian Crosswalk Behavior Using Convolutional Neural Networks. CoRR abs/2208.07250 (2022) - 2021
- [j53]Xinxin Yang, Mark Stamp:
Computer-aided diagnosis of low grade endometrial stromal sarcoma (LGESS). Comput. Biol. Medicine 138: 104874 (2021) - [c22]Aparna Sunil Kale, Fabio Di Troia, Mark Stamp:
Malware Classification with Word Embedding Features. ICISSP 2021: 733-742 - [c21]Dennis Dang, Fabio Di Troia, Mark Stamp:
Malware Classification using Long Short-term Memory Models. ICISSP 2021: 743-752 - [c20]Jing Zhao, Samanvitha Basole, Mark Stamp:
Malware Classification with GMM-HMM Models. ICISSP 2021: 753-762 - [c19]Elliu Huang, Fabio Di Troia, Mark Stamp, Preethi Sundaravaradhan:
A New Dataset for Smartphone Gesture-based Authentication. ICISSP 2021: 771-780 - [i22]Aparna Sunil Kale, Fabio Di Troia, Mark Stamp:
Malware Classification with Word Embedding Features. CoRR abs/2103.02711 (2021) - [i21]Dennis Dang, Fabio Di Troia, Mark Stamp:
Malware Classification Using Long Short-Term Memory Models. CoRR abs/2103.02746 (2021) - [i20]Jing Zhao, Samanvitha Basole, Mark Stamp:
Malware Classification with GMM-HMM Models. CoRR abs/2103.02753 (2021) - [i19]Andy Phung, Mark Stamp:
Universal Adversarial Perturbations and Image Spam Classifiers. CoRR abs/2103.05469 (2021) - [i18]Sunhera Paul, Mark Stamp:
Word Embedding Techniques for Malware Evolution Detection. CoRR abs/2103.05759 (2021) - [i17]Samanvitha Basole, Mark Stamp:
Cluster Analysis of Malware Family Relationships. CoRR abs/2103.05761 (2021) - [i16]Aniket Chandak, Wendy Lee, Mark Stamp:
A Comparison of Word2Vec, HMM2Vec, and PCA2Vec for Malware Classification. CoRR abs/2103.05763 (2021) - [i15]Zidong Jiang, Fabio Di Troia, Mark Stamp:
Sentiment Analysis for Troll Detection on Weibo. CoRR abs/2103.09054 (2021) - [i14]Mark Stamp, Aniket Chandak, Gavin Wong, Allen Ye:
On Ensemble Learning. CoRR abs/2103.12521 (2021) - [i13]Mugdha Jain, William Andreopoulos, Mark Stamp:
CNN vs ELM for Image-Based Malware Classification. CoRR abs/2103.13820 (2021) - [i12]Pratikkumar Prajapati, Mark Stamp:
An Empirical Analysis of Image-Based Learning Techniques for Malware Classification. CoRR abs/2103.13827 (2021) - [i11]Han-Chih Chang, Jianwei Li, Ching-Seh Wu, Mark Stamp:
Machine Learning and Deep Learning for Fixed-Text Keystroke Dynamics. CoRR abs/2107.00507 (2021) - [i10]Rakesh Nagaraju, Mark Stamp:
Auxiliary-Classifier GAN for Malware Analysis. CoRR abs/2107.01620 (2021) - [i9]Lolitha Sresta Tupadha, Mark Stamp:
Machine Learning for Malware Evolution Detection. CoRR abs/2107.01627 (2021) - [i8]Xinxin Yang, Mark Stamp:
Computer-Aided Diagnosis of Low Grade Endometrial Stromal Sarcoma (LGESS). CoRR abs/2107.05426 (2021) - [i7]Jianwei Li, Han-Chih Chang, Mark Stamp:
Free-Text Keystroke Dynamics for User Authentication. CoRR abs/2107.07009 (2021) - [i6]Han-Chih Chang, Jianwei Li, Mark Stamp:
Machine Learning-Based Analysis of Free-Text Keystroke Dynamics. CoRR abs/2107.07409 (2021) - [i5]Ruchira Gothankar, Fabio Di Troia, Mark Stamp:
Clickbait Detection in YouTube Videos. CoRR abs/2107.12791 (2021) - [i4]Elliu Huang, Fabio Di Troia, Mark Stamp:
Evaluating Deep Learning Models and Adversarial Attacks on Accelerometer-Based Gesture Authentication. CoRR abs/2110.14597 (2021) - 2020
- [j52]Guruswamy Nellaivadivelu, Fabio Di Troia, Mark Stamp:
Black box analysis of android malware detectors. Array 6: 100022 (2020) - [j51]Mayuri Wadkar, Fabio Di Troia, Mark Stamp:
Detecting malware evolution using support vector machines. Expert Syst. Appl. 143 (2020) - [j50]Tazmina Sharmin, Fabio Di Troia, Katerina Potika, Mark Stamp:
Convolutional neural networks for image spam detection. Inf. Secur. J. A Glob. Perspect. 29(3): 103-117 (2020) - [j49]Samanvitha Basole, Fabio Di Troia, Mark Stamp:
Multifamily malware models. J. Comput. Virol. Hacking Tech. 16(1): 79-92 (2020) - [j48]Mugdha Jain, William Andreopoulos, Mark Stamp:
Convolutional neural networks and extreme learning machines for malware classification. J. Comput. Virol. Hacking Tech. 16(3): 229-244 (2020)
2010 – 2019
- 2019
- [j47]Anish Singh Shekhawat, Fabio Di Troia, Mark Stamp:
Feature analysis of encrypted malicious traffic. Expert Syst. Appl. 125: 130-141 (2019) - [j46]Aditya Raghavan, Fabio Di Troia, Mark Stamp:
Hidden Markov models with random restarts versus boosting for malware detection. J. Comput. Virol. Hacking Tech. 15(2): 97-107 (2019) - [j45]Supraja Suresh, Fabio Di Troia, Katerina Potika, Mark Stamp:
An analysis of Android adware. J. Comput. Virol. Hacking Tech. 15(3): 147-160 (2019) - [c18]Neeraj Chavan, Fabio Di Troia, Mark Stamp:
A Comparative Analysis of Android Malware. ICISSP 2019: 664-673 - [c17]Niket Bhodia, Pratikkumar Prajapati, Fabio Di Troia, Mark Stamp:
Transfer Learning for Image-based Malware Classification. ICISSP 2019: 719-726 - [i3]Swapna Vemparala, Fabio Di Troia, Corrado Aaron Visaggio, Thomas H. Austin, Mark Stamp:
Malware Detection Using Dynamic Birthmarks. CoRR abs/1901.07312 (2019) - [i2]Niket Bhodia, Pratikkumar Prajapati, Fabio Di Troia, Mark Stamp:
Transfer Learning for Image-Based Malware Classification. CoRR abs/1903.11551 (2019) - [i1]Neeraj Chavan, Fabio Di Troia, Mark Stamp:
A Comparative Analysis of Android Malware. CoRR abs/1904.00735 (2019) - 2018
- [j44]Annapurna Annadatha, Mark Stamp:
Image spam analysis and detection. J. Comput. Virol. Hacking Tech. 14(1): 39-52 (2018) - [j43]Suchita Deshmukh, Fabio Di Troia, Mark Stamp:
Vigenère scores for malware detection. J. Comput. Virol. Hacking Tech. 14(2): 157-165 (2018) - [c16]Mark Stamp, Fabio Di Troia, Miles Stamp, Jasper Huang:
Hidden Markov Models for Vigenère Cryptanalysis. HistoCrypt 2018: 149:011 - [c15]Aneri Chavda, Katerina Potika, Fabio Di Troia, Mark Stamp:
Support Vector Machines for Image Spam Analysis. ICETE (1) 2018: 597-607 - [c14]Naman Bagga, Fabio Di Troia, Mark Stamp:
On the Effectiveness of Generic Malware Models. ICETE (1) 2018: 608-616 - [c13]Wei-Chung Huang, Fabio Di Troia, Mark Stamp:
Robust Hashing for Image-based Malware Classification. ICETE (1) 2018: 617-625 - [c12]Jasper Huang, Fabio Di Troia, Mark Stamp:
Acoustic Gait Analysis using Support Vector Machines. ICISSP 2018: 545-552 - [c11]Sravani Yajamanam, Vikash Raja Samuel Selvin, Fabio Di Troia, Mark Stamp:
Deep Learning versus Gist Descriptors for Image-based Malware Classification. ICISSP 2018: 553-561 - [c10]Prathiba Nagarajan, Fabio Di Troia, Thomas H. Austin, Mark Stamp:
Autocorrelation Analysis of Financial Botnet Traffic. ICISSP 2018: 599-606 - [p5]Mark Stamp:
A Survey of Machine Learning Algorithms and Their Application in Information Security. Guide to Vulnerability Analysis for Computer Networks and Systems 2018: 33-55 - [p4]Deebiga Rajeswaran, Fabio Di Troia, Thomas H. Austin, Mark Stamp:
Function Call Graphs Versus Machine Learning for Malware Detection. Guide to Vulnerability Analysis for Computer Networks and Systems 2018: 259-279 - [p3]Dhiviya Dhanasekar, Fabio Di Troia, Katerina Potika, Mark Stamp:
Detecting Encrypted and Polymorphic Malware Using Hidden Markov Models. Guide to Vulnerability Analysis for Computer Networks and Systems 2018: 281-299 - [p2]Swathi Nambiar Kadala Manikoth, Fabio Di Troia, Mark Stamp:
Masquerade Detection on Mobile Devices. Guide to Vulnerability Analysis for Computer Networks and Systems 2018: 301-315 - 2017
- [j42]Rohit Vobbilisetty, Fabio Di Troia, Richard M. Low, Corrado Aaron Visaggio, Mark Stamp:
Classic cryptanalysis using hidden Markov models. Cryptologia 41(1): 1-28 (2017) - [j41]Ismeet Kaur Makkar, Fabio Di Troia, Corrado Aaron Visaggio, Thomas H. Austin, Mark Stamp:
SocioBot: a Twitter-based botnet. Int. J. Secur. Networks 12(1): 1-12 (2017) - [j40]Anusha Damodaran, Fabio Di Troia, Corrado Aaron Visaggio, Thomas H. Austin, Mark Stamp:
A comparison of static, dynamic, and hybrid analysis for malware detection. J. Comput. Virol. Hacking Tech. 13(1): 1-12 (2017) - [j39]Swathi Pai, Fabio Di Troia, Corrado Aaron Visaggio, Thomas H. Austin, Mark Stamp:
Clustering for malware classification. J. Comput. Virol. Hacking Tech. 13(2): 95-107 (2017) - [j38]Sukanya Thakur, Mark Stamp:
A completely covert audio channel in Android. J. Comput. Virol. Hacking Tech. 13(3): 141-152 (2017) - [c9]Ankita Kapratwar, Fabio Di Troia, Mark Stamp:
Static and Dynamic Analysis of Android Malware. ICISSP 2017: 653-662 - 2016
- [j37]Tanuvir Singh, Fabio Di Troia, Corrado Aaron Visaggio, Thomas H. Austin, Mark Stamp:
Support vector machines and malware detection. J. Comput. Virol. Hacking Tech. 12(4): 203-212 (2016) - [j36]Usha Narra, Fabio Di Troia, Corrado Aaron Visaggio, Thomas H. Austin, Mark Stamp:
Clustering versus SVM for malware detection. J. Comput. Virol. Hacking Tech. 12(4): 213-224 (2016) - [c8]Swapna Vemparala, Fabio Di Troia, Corrado Aaron Visaggio, Thomas H. Austin, Mark Stamp:
Malware Detection Using Dynamic Birthmarks. IWSPA@CODASPY 2016: 41-46 - [c7]Nikitha Ganesh, Fabio Di Troia, Corrado Aaron Visaggio, Thomas H. Austin, Mark Stamp:
Static Analysis of Malicious Java Applets. IWSPA@CODASPY 2016: 58-63 - [c6]Fabio Di Troia, Corrado Aaron Visaggio, Thomas H. Austin, Mark Stamp:
Advanced transcriptase for JavaScript malware. MALWARE 2016: 121-128 - 2015
- [j35]Arshi Agrawal, Mark Stamp:
Masquerade detection on GUI-based Windows systems. Int. J. Secur. Networks 10(1): 32-41 (2015) - [j34]Jared Lee, Thomas H. Austin, Mark Stamp:
Compression-based analysis of metamorphic malware. Int. J. Secur. Networks 10(2): 124-136 (2015) - [j33]Chinmayee Annachhatre, Thomas H. Austin, Mark Stamp:
Hidden Markov models for malware classification. J. Comput. Virol. Hacking Tech. 11(2): 59-73 (2015) - [j32]Mangesh Musale, Thomas H. Austin, Mark Stamp:
Hunting for metamorphic JavaScript malware. J. Comput. Virol. Hacking Tech. 11(2): 89-102 (2015) - [j31]Ashwin Kalbhor, Thomas H. Austin, Eric Filiol, Sébastien Josse, Mark Stamp:
Dueling hidden Markov models for virus analysis. J. Comput. Virol. Hacking Tech. 11(2): 103-118 (2015) - [j30]Ranjith Kumar Jidigam, Thomas H. Austin, Mark Stamp:
Singular value decomposition and metamorphic detection. J. Comput. Virol. Hacking Tech. 11(4): 203-216 (2015) - 2014
- [j29]Aditya Oza, Kevin Ross, Richard M. Low, Mark Stamp:
HTTP attack detection using n-gram analysis. Comput. Secur. 45: 242-254 (2014) - [j28]Kelly Chang, Richard M. Low, Mark Stamp:
Cryptanalysis of Typex. Cryptologia 38(2): 116-132 (2014) - [j27]Hardikkumar Rana, Mark Stamp:
Hunting for Pirated Software Using Metamorphic Analysis. Inf. Secur. J. A Glob. Perspect. 23(3): 68-85 (2014) - [j26]Sayali Deshpande, Young Hee Park, Mark Stamp:
Eigenvalue analysis for metamorphic detection. J. Comput. Virol. Hacking Tech. 10(1): 53-65 (2014) - [j25]Teja Tamboli, Thomas H. Austin, Mark Stamp:
Metamorphic code generation from LLVM bytecode. J. Comput. Virol. Hacking Tech. 10(3): 177-187 (2014) - [j24]Nikki Benecke Brandt, Mark Stamp:
Automating NFC message sending for good and evil. J. Comput. Virol. Hacking Tech. 10(4): 273-297 (2014) - 2013
- [j23]Young Hee Park, Douglas S. Reeves, Mark Stamp:
Deriving common malware behavior through graph clustering. Comput. Secur. 39: 419-430 (2013) - [j22]Amrapali Dhavare, Richard M. Low, Mark Stamp:
Efficient Cryptanalysis of Homophonic Substitution Ciphers. Cryptologia 37(3): 250-281 (2013) - [j21]Shabana Kazi, Mark Stamp:
Hidden Markov Models for Software Piracy Detection. Inf. Secur. J. A Glob. Perspect. 22(3): 140-149 (2013) - [j20]Annie H. Toderici, Mark Stamp:
Chi-squared distance and metamorphic virus detection. J. Comput. Virol. Hacking Tech. 9(1): 1-14 (2013) - [j19]Sudarshan Madenur Sridhara, Mark Stamp:
Metamorphic worm that carries its own morphing engine. J. Comput. Virol. Hacking Tech. 9(2): 49-58 (2013) - [j18]Gayathri Shanmugam, Richard M. Low, Mark Stamp:
Simple substitution distance and metamorphic detection. J. Comput. Virol. Hacking Tech. 9(3): 159-170 (2013) - [j17]Donabelle Baysa, Richard M. Low, Mark Stamp:
Structural entropy and metamorphic malware. J. Comput. Virol. Hacking Tech. 9(4): 179-192 (2013) - [c5]Thomas H. Austin, Eric Filiol, Sébastien Josse, Mark Stamp:
Exploring Hidden Markov Models for Virus Analysis: A Semantic Approach. HICSS 2013: 5039-5048 - 2012
- [j16]Neha Runwal, Richard M. Low, Mark Stamp:
Opcode graph similarity and metamorphic detection. J. Comput. Virol. 8(1-2): 37-52 (2012) - 2011
- [j15]Lin Huang, Mark Stamp:
Masquerade detection using profile hidden Markov models. Comput. Secur. 30(8): 732-747 (2011) - [j14]Da Lin, Mark Stamp:
Hunting for undetectable metamorphic viruses. J. Comput. Virol. 7(3): 201-214 (2011) - 2010
- [j13]Priti Desai, Mark Stamp:
A highly metamorphic virus generator. Int. J. Multim. Intell. Secur. 1(4): 402-427 (2010) - [j12]Vaibhav Ranchhoddas Pandya, Mark Stamp:
iPhone Security Analysis. J. Information Security 1(2): 74-87 (2010) - [p1]Teodoro Cipresso, Mark Stamp:
Software Reverse Engineering. Handbook of Information and Communication Security 2010: 659-696 - [e1]Peter P. Stavroulakis, Mark Stamp:
Handbook of Information and Communication Security. Springer 2010, ISBN 978-3-642-04116-7 [contents]
2000 – 2009
- 2009
- [j11]Srilatha Attaluri, Scott McGhee, Mark Stamp:
Profile hidden Markov models and metamorphic virus detection. J. Comput. Virol. 5(2): 151-169 (2009) - 2008
- [j10]Hsu-Hui Lee, Mark Stamp:
An agent-based privacy-enhancing model. Inf. Manag. Comput. Secur. 16(3): 305-319 (2008) - [c4]Jian Dai, Mark Stamp:
QuickPay Online Payment Protocol. SEKE 2008: 223-226 - 2007
- [j9]Mark Stamp, Wing On Chan:
Sigaba: Cryptanalysis of the Full Keyspace. Cryptologia 31(3): 201-222 (2007) - [j8]E. John Sebes, Mark Stamp:
Solvable problems in enterprise digital rights management. Inf. Manag. Comput. Secur. 15(1): 33-45 (2007) - 2006
- [j7]Wing Wong, Mark Stamp:
Hunting for metamorphic engines. J. Comput. Virol. 2(3): 211-229 (2006) - [c3]Amit Mathur, Suneuy Kim, Mark Stamp:
Role Based Access Control and the JXTA Peer-to-Peer Framework. Security and Management 2006: 390-398 - [c2]Hsu-Hui Lee, Mark Stamp:
P3P privacy enhancing agent. SWS 2006: 109-110 - 2005
- [b2]Mark Stamp:
Information security - principles and practice. Wiley 2005, ISBN 978-0-471-73848-0, pp. I-XXI, 1-390 - [j6]Clyde F. Martin, Mark Stamp, Dorothy I. Wallace:
A characterization of a class of discrete nonlinear feedback systems. Commun. Inf. Syst. 5(3): 305-310 (2005) - [c1]Martina Simova, Mark Stamp, Chris Pollett:
Stealthy Ciphertext. International Conference on Internet Computing 2005: 380-388 - 2004
- [j5]Mark Stamp:
Risks of monoculture. Commun. ACM 47(3): 120 (2004) - 2003
- [j4]Mark Stamp:
Digital Rights Management: The Technology Behind the Hype. J. Electron. Commer. Res. 4(3): 102-112 (2003) - 2002
- [j3]Mark Stamp:
Risks of digital rights management. Commun. ACM 45(9): 120 (2002)
1990 – 1999
- 1993
- [j2]Mark Stamp, Clyde F. Martin:
An algorithm for the k-error linear complexity of binary sequences with period 2n. IEEE Trans. Inf. Theory 39(4): 1398-1401 (1993) - 1992
- [b1]Mark Steven Stamp:
A generalized linear complexity. Texas Tech University, Lubbock, USA, 1992 - [j1]Mark Stamp:
Circular Binary Sequences. SIAM Rev. 34(3): 496-497 (1992)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-10 20:50 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint