____________________________________________________________________________________
Current Teaching | Open Opportunities | My CV PDF
____________________________________________________________________________________

 
SELECTED PUBLICATIONS:
__________________________________
BOOKS:

______________________________________________________________________________________

JOURNALS:

  • Desoky, A., "Innocipher: A Novel Innocent-Cipher-Based Cryptography Paradigm – High Level Of Security For Fooling The Enemy," Information Security Journal, 83-97, 2013..
  • Desoky, A., "Jokestega: Automatic Joke Generation Based Steganography," International Journal of Security and Networks, Vol.7, No.3, pp.148 – 160, 2012.
  • Desoky, A., "Edustega: An Education-Centric Steganography Methodology," International Journal of Security and Networks, Vol. 6, No. 2/3, pp. 153-173, 2011.
  • Desoky, A., "Sumstega: Summarization-Based Steganography Methodology," International Journal of Information and Computer Security, Vol. 4, No. 3, pp. 234 - 263, 2011.
  • Desoky, A., "Headstega: E-Mail-Headers-Based Steganography Methodology," International Journal of Electronic Security and Digital Forensics, Vol. 3, No. 4, pp. 289 - 310, 2010.
  • Desoky, A., "Comprehensive Linguistic Steganography Survey," International Journal of Information and Computer Security, Vol. 4, No. 2, pp. 164-197, 2010.
  • Desoky, A., "NORMALS: Normal Linguistic Steganography Methodology," Journal of Information Hiding and Multimedia Signal Processing, Vol. 1, No. 3, pp. 145-171, July 2010.
  • Desoky, A., "Matlist: Mature Linguistic Steganography Methodology," Journal of Security and Communication Networks, Vol. 4, No. 6, pp. 697-718, 2011.
  • Desoky, A., "Listega: List-Based Steganography Methodology," International Journal of Information Security, Springer-Verlag, Vol. 8, No. 4, pp. 247-261, April 2009.
  • Desoky, A., and Younis, M., "Chestega: Chess Steganography Methodology," Journal of Security and Communication Networks, Vol. 2, Issue 6, pp. 555 - 566, March 2009.
  • Desoky, A. “Notestega: Notes-Based Steganography Methodology,” Information Security Journal: A Global Perspective, Vol. 18, No 4, pp. 178-193, January 2009.
  • Desoky, A., "Nostega: A Novel Noiseless Steganography Paradigm," Journal of Digital Forensic Practice, Vol. 2, No. 3, pp. 132-139, July 2008.
  • Desoky, A., and Younis, M., "Graphstega: Graph Steganography Methodology," Journal of Digital Forensic Practice, Vol. 2, No. 1, pp. 27-36, January 2008.
______________________________________________________________________________________
CONFERENCES:
  • Peng Meng, Yun-Qing Shi, Liusheng Huang, Zhili Chen, Wei Yang, and Abdelrahman Desoky, “LinL: Lost in n-best list,” in the Proceedings of 13th Information Hiding Conference, pp. 329-341, May 2011 .
  • Desoky, A., et al., "Auto-Summarization-Based Steganography," in the Proceedings of the 5th IEEE International Conference on Innovations in Information Technology, pp. 608 - 612, December 2008.
______________________________________________________________________________________
SYMPOSIUMS:
  • Desoky, A., ”A Novel Hardware Security Methodology (HSM) for Computers and Networks” STOS 2003 Symposium Event (Secure Trusted Operating System Consortium) at The George Washington University. (Invited Speaker, 2003).
______________________________________________________________________________________
TECHNICAL REPORTS:
  • Desoky, A. and Younis, M., “PSM: Public Steganography Methodology,” Technical Report TR-CS-06-07, Department of Computer Science and Electrical Engineering, University of Maryland, November 2006.
  • Desoky, A., “Matlist: Mature Linguistic Steganography Methodology,” Technical Report TR-CS-08-02, Department of Computer Science and Electrical Engineering, University of Maryland, July 2008.
______________________________________________________________________________________