![](https://dblp.uni-trier.de./img/logo.320x120.png)
![search dblp search dblp](https://dblp.uni-trier.de./img/search.dark.16x16.png)
![search dblp](https://dblp.uni-trier.de./img/search.dark.16x16.png)
default search action
EURASIP Journal on Information Security, Volume 2019
Volume 2019, 2019
- Juan Zhao, Sachin Shetty
, Jan Wei Pan, Charles A. Kamhoua, Kevin A. Kwiat:
Transfer learning for detecting unknown network attacks. 1 - Fabian Knirsch, Andreas Unterweger
, Dominik Engel:
Implementing a blockchain from scratch: why, how, and what we learned. 2 - Yahong Hu
, Xia Sheng, Jiafa Mao, Kaihui Wang, Danhong Zhong:
Spark-based real-time proactive image tracking protection model. 3 - Suleiman Y. Yerima, Mohammed K. Alzaylaee
, Sakir Sezer:
Machine learning-based dynamic analysis of Android apps with improved code coverage. 4 - Xing Fang
, Maochao Xu, Shouhuai Xu, Peng Zhao:
A deep learning framework for predicting cyber attacks rates. 5 - Pallavi Deshpande, Prachi Mukherji
, Anil S. Tavildar:
Accuracy enhancement of biometric recognition using iterative weights optimization algorithm. 6 - Christian Gehrmann
, Marcus Rodan, Niklas Jönsson:
Metadata filtering for user-friendly centralized biometric authentication. 7 - Chengli Zhang
, Wenping Ma, Hefeng Chen, Feifei Zhao:
A new method of generating hard random lattices with short bases. 8 - Fitzroy Nembhard
, Marco M. Carvalho
, Thomas C. Eskridge
:
Towards the application of recommender systems to secure coding. 9 - Stefano Giovanni Rizzo
, Flavio Bertini
, Danilo Montesi
:
Fine-grain watermarking for intellectual property protection. 10 - Riwa Mouawi
, Imad H. Elhajj
, Ali Chehab
, Ayman I. Kayssi:
Crowdsourcing for click fraud detection. 11 - Taras Stanko, Bin Chen
, Boris Skoric
:
Fingerprint template protection using minutia-pair spectral representations. 12 - Wenjun Yang, Jiaying Zhang
, Chundong Wang, Xiu-liang Mo:
Situation prediction of large-scale Internet of Things network security. 13 - Kubilay Ahmet Küçük
, David Grawrock, Andrew Martin:
Managing confidentiality leaks through private algorithms on Software Guard eXtensions (SGX) enclaves. 14 - Johannes Buchmann, Matthias Geihs, Kay Hamacher, Stefan Katzenbeisser, Sebastian Stammler
:
Long-term integrity protection of genomic data. 15 - Jivitesh Sharma
, Charul Giri, Ole-Christoffer Granmo, Morten Goodwin:
Multi-layer intrusion detection system with ExtraTrees feature selection, extreme learning machine ensemble, and softmax aggregation. 16
![](https://dblp.uni-trier.de./img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.