default search action
EURASIP Journal on Information Security, Volume 2024
Volume 2024, Number 1, December 2024
- (Withdrawn) Research on privacy and secure storage protection of personalized medical data based on hybrid encryption. 1
- (Withdrawn) IoT devices and data availability optimization by ANN and KNN. 2
- (Withdrawn) Improved RFID mutual authentication protocol against exhaustive attack in the context of big data. 3
- (Withdrawn) Efficient identity security authentication method based on improved R-LWE algorithm in IoT environment. 4
- (Withdrawn) RFID tag recognition model for Internet of Things for training room management. 5
- (Withdrawn) Network security threat detection technology based on EPSO-BP algorithm. 6
- Arslan Ali, Andrea Migliorati, Tiziano Bianchi, Enrico Magli:
Cancelable templates for secure face verification based on deep learning and random projections. 7 - Mathappan Nivaashini, Suganya Elavarasan, Sountharrajan Sehar, M. Prabu, Durga Prasad Bavirisetti:
FEDDBN-IDS: federated deep belief network-based wireless network intrusion detection system. 8 - Kiran Saleem, Lei Wang, Salil Bharany, Khmaies Ouahada, Ateeq Ur Rehman, Habib Hamam:
Intelligent multi-agent model for energy-efficient communication in wireless sensor networks. 9 - Anum Paracha, Junaid Arshad, Mohamed Ben Farah, Khalid Ismail:
Machine learning security and privacy: a review of threats and countermeasures. 10 - Retraction Note: Network security threat detection technology based on EPSO-BP algorithm. 11
- Retraction Note: IoT devices and data availability optimization by ANN and KNN. 12
- Retraction Note: Efficient identity security authentication method based on improved R-LWE algorithm in IoT environment. 13
- Retraction Note: Node fault diagnosis algorithm for wireless sensor networks based on BN and WSN. 14
- Retraction Note: Research on privacy and secure storage protection of personalized medical data based on hybrid encryption. 15
- Retraction Note: Improved RFID mutual authentication protocol against exhaustive attack in the context of big data. 16
- Retraction Note: Hierarchical energy-saving routing algorithm using fuzzy logic in wireless sensor networks. 17
- Retraction Note: The design of network security protection trust management system based on an improved hidden Markov model. 18
- Retraction Note: RFID tag recognition model for Internet of Things for training room management. 19
- Arkan Hammoodi Hasan Kabla, Achmad Husni Thamrin, Mohammed Anbar, Selvakumar Manickam, Shankar Karuppayah:
Peer-to-peer botnets: exploring behavioural characteristics and machine/deep learning-based detection. 20 - Matthew Comb, Andrew Martin:
Mining digital identity insights: patent analysis using NLP. 21 - Jimin Zhang, Xiaolei He, Yun Cao:
Errorless robust JPEG steganography using steganographic polar codes. 22 - Randy Kuang, Maria Perepechaenko, Ryan Toth, Michel Barbeau:
Performance comparison of quantum-safe multivariate polynomial public key encapsulation algorithm. 23 - Shuying Xu, Ching-Chun Chang, Huy H. Nguyen, Isao Echizen:
Reversible anonymization for privacy of facial biometrics via cyclic learning. 24 - Nezer Jacob Zaidenberg, Michael Kiperberg:
HyperWallet: cryptocurrency wallet as a secure hypervisor-based application. 25 - Mohamed A. Taha, Mohamed K. M. Fadul, Joshua H. Tyler, Donald R. Reising, T. Daniel Loveless:
Enhancing internet of things security using entropy-informed RF-DNA fingerprint learning from Gabor-based images. 27 - Yingcong Hong, Junyi Li, Yaping Lin, Qiao Hu, Xiehua Li:
Trajectory-aware privacy-preserving method with local differential privacy in crowdsourcing. 28 - Arpitha T., Dharamendra Chouhan, Shreyas J.:
DQ-NN and phantom routing for enhanced source location privacy for IoT under multiple source and destination. 29 - Maria Zubair, Maryam Sabzevari, Vikramajeet Khatri, Sasu Tarkoma, Kimmo Hätönen:
Access control for trusted data sharing. 30 - Antoine Mallet, Martin Benes, Rémi Cogranne:
Cover-source mismatch in steganalysis: systematic review. 26 - Hanaa S. Ali, Eman I. Elhefnawy, Mohammed Abo-Zahhad:
Cancelable palmprint: intelligent framework toward secure and privacy-aware recognition system. 31 - Kassem Kallas, Quentin Le Roux, Wassim Hamidouche, Teddy Furon:
Strategic safeguarding: A game theoretic approach for analyzing attacker-defender behavior in DNN backdoors. 32 - Amarjyoti Pathak, Th. Shanta Kumar, Utpal Barman:
Static analysis framework for permission-based dataset generation and android malware detection using machine learning. 33 - Giulia Bertazzini, Daniele Baracchi, Dasara Shullani, Massimo Iuliani, Alessandro Piva:
CoFFEE: a codec-based forensic feature extraction and evaluation software for H.264 videos. 34 - Igor Tasic, Antonio Villafranca, María-Dolores Cano:
Reinforcing cybersecurity with Bloom filters: a novel approach to password cracking efficiency. 35
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.