Digital forensics of Microsoft Office 2007–2013 documents to prevent covert communicationZhangjie Fu, Xingming Sun, Jie XiJournal of Communications and Networks20151 Excerpt
Human Behavior Recognition: Semantics-Based Text Copy Detection MethodLiu Yang, Jie Xi2015 First International Conference on…2015
Steganography in Modern Smartphones and Mitigation TechniquesWojciech Mazurczyk, Luca CaviglioneIEEE Communications Surveys & Tutorials20153 Excerpts
OOXML File Analysis of the July 22nd Terrorist ManualHanno LangwegCommunications and Multimedia Security20121 Excerpt