| 2007 |
| 11 | | George Hamer,
David Andrawis,
Stephen Krebsbach:
Application of the RS Method to Detect Steganographic Messages in Database Table.
CAINE 2007: 225-231 |
| 2006 |
| 10 | | Stephen Krebsbach,
George Hamer:
Achieving near-optimal distortion reduction with invisible watermarking RSSI algorithms.
CAINE 2006: 18-23 |
| 9 | | George Hamer,
Stephen Krebsbach:
Statistical steganography and steganalysis of database tables.
CAINE 2006: 95-101 |
| 8 | | George Hamer,
William Perrizo:
Statistic Preserving Steganography using Database Tables.
Computers and Their Applications 2006: 441-445 |
| 7 | | George Hamer,
William Perrizo:
Chi-Squared Statistical Steganalysis of Database Tables.
SEDE 2006: 292-297 |
| 2005 |
| 6 | | Masum Serazi,
Amal Perera,
Taufik Abidin,
George Hamer,
William Perrizo:
An Api for Transparent Distributed Vertical Data Mining.
IASSE 2005: 151-156 |
| 5 | | George Hamer,
William Perrizo:
Secure Steganography using the Most Significant Bits.
IASSE 2005: 169-173 |
| 4 | | George Hamer,
William Perrizo:
Creating Short Length Masks using Vertical Processing.
IASSE 2005: 51-54 |
| 3 | | Amal Perera,
Taufik Abidin,
Masum Serazi,
George Hamer,
William Perrizo:
Vertical Set Square Distance Based Clustering without Prior Knowledge of K.
IASSE 2005: 72-77 |
| 2003 |
| 2 | | Stephen Krebsbach,
George Hamer,
William Perrizo:
Watermarking Remotely Sensed Images (RSI) (Digital Image or Relational Data?).
CAINE 2003: 17-21 |
| 1 | | George Hamer,
Daniel Steinwand:
Extending the Beowulf Cluster to the Desktop.
CAINE 2003: 329 |