[1]台灣上網人數創新高,
http://investintaiwan.nat.gov.tw/zh-tw/news/200801/2008010401.html。
[2]混合式威脅,
http://www.symantec.com/zh/tw/norton/security_response/glossary.jsp。
[3]Trend Micro Antivirus對於處理UPX所壓縮的PE檔存有緩衝區溢位的弱點,
http://www.twncert.org.tw/tw/index.php?PHPSESSID=286bc84743df87825773bb55ea9c0ab3。
[4]台灣徵軟安全性公告MS04-028,
http://www.microsoft.com/taiwan/security/bulletin/MS04-028.mspx。
[5]資訊隱藏(Steganography):高科技隱藏訊息,
http://www.symantec.com/region/tw/enterprise/article/steganography.html。
[6]劉江龍、婁德權、江天賜、李建中、曾馭,“以資訊隱藏為基礎之惡意程式攻擊技術”,2007危機管理國際學術研討會論文集,嶺東科技大學,台中,第325-336頁,2007。
[7]Cacciaguerra, S. and Ferretti, S., “Data Hiding: Steganography and Copyright Marking,”
http://www.cs.unibo.it/people/phd-students/scacciag/home_files/teach/datahiding.pdf.
[8]Ker, A. D., “A General Framework for Structural Steganalysis of LSB Replacement,” Lecture Notes in Computer Science, Vol. 3727, pp. 296-311, November, 2005.
[9]Jpeg-steg, http://www.ussrback.com/crypto/steanography/DOS/jsteg.txt.
[10]劉江龍、婁德權、江天賜、李建中、曾馭,“以資訊隱藏為基礎之惡意程式偵測技術”,96年度國防科技學術合作計畫成果發表會論文集,桃園,2007。
[11]Westfield, A. and Pfitzmann, A., “Attacks on Steganographic Systems,” Proceedings of the 3rd International Workshop on Information Hiding, Dresden, Germany, pp. 61-76, Sep. 28-Oct. 1, 1999.
[12]Hide4PGP, http://www.heinz-repp.onlinehome.de/Hide4PGd.htm.
[13]Steganos, http://www.demcom.com/.
[14]S-tools, http://www.stegoarchive.com/.
[15]Fridrich, J., Goljan, M., Du, R., “Reliable Detection of LSB Steganography in Color and Grayscale Images,” Proceeding of the ACM Workshop on Multimedia and Security, pp. 27-30, 2001.
[16]Fridrich, J., Goljan, M., Du, R., “Detecting LSB Steganography in Color and Gray-Scale images,” IEEE Multimedia, Vol. 8, No. 4, pp. 22-28, 2001.
[17]http://forum.slime.com.tw/thread159006.html.
[18]Blomgren, M., “Introduction to Shellcoding,”
http://tigerteam.se/dl/papers/intro_to_shellcoding.pdf.
[19]卡巴斯基實驗室,http://www.kaspersky.com.tw/。
[20]Symantec Corp., http://www.symantec.com/zh/tw/index.jsp.
[21]台灣趨勢科技,http://www.trendmicro.com/tw/home/enterprise.htm。
[22]Vapnik, V. N., The Nature of Statistical Learning Theory, Springer-Verlag, Germany, 1995.
[23]王智勇,“具高度安全性之資訊隱藏技術”,碩士論文,國防大學中正理工學院,桃園,2003。[24]CBIR Image Database, University of Washington, Sep. 19, 2006, http://www.cs.washington.edu/research/imagedatabase.
[25]Slaby, A., “ROC Analysis with Matlab,” Proceedings of the ITI 2007 29th International Conference on Information Technology Interfaces, pp. 191-196, Cavtat, Croatia, June 25-28, 2007.