Works matching IS 16874161 AND DT 2018 AND VI 2018 AND IP 1
Results: 13
Detecting data manipulation attacks on physiological sensor measurements in wearable medical systems.
- Published in:
- EURASIP Journal on Information Security, 2018, v. 2018, n. 1, p. 1, doi. 10.1186/s13635-018-0082-y
- By:
- Publication type:
- Article
A generic integrity verification algorithm of version files for cloud deduplication data storage.
- Published in:
- EURASIP Journal on Information Security, 2018, v. 2018, n. 1, p. 1, doi. 10.1186/s13635-018-0083-x
- By:
- Publication type:
- Article
HADEC: Hadoop-based live DDoS detection framework.
- Published in:
- EURASIP Journal on Information Security, 2018, v. 2018, n. 1, p. 1, doi. 10.1186/s13635-018-0081-z
- By:
- Publication type:
- Article
Cybersecurity: trends, issues, and challenges.
- Published in:
- EURASIP Journal on Information Security, 2018, v. 2018, n. 1, p. 1, doi. 10.1186/s13635-018-0080-0
- By:
- Publication type:
- Article
Detection of spoofed and non-spoofed DDoS attacks and discriminating them from flash crowds.
- Published in:
- EURASIP Journal on Information Security, 2018, v. 2018, n. 1, p. 1, doi. 10.1186/s13635-018-0079-6
- By:
- Publication type:
- Article
Towards 5G cellular network forensics.
- Published in:
- EURASIP Journal on Information Security, 2018, v. 2018, n. 1, p. 1, doi. 10.1186/s13635-018-0078-7
- By:
- Publication type:
- Article
Secrecy outage of threshold-based cooperative relay network with and without direct links.
- Published in:
- EURASIP Journal on Information Security, 2018, v. 2018, n. 1, p. 1, doi. 10.1186/s13635-018-0077-8
- By:
- Publication type:
- Article
OMMA: open architecture for Operator-guided Monitoring of Multi-step Attacks.
- Published in:
- EURASIP Journal on Information Security, 2018, v. 2018, n. 1, p. 1, doi. 10.1186/s13635-018-0075-x
- By:
- Publication type:
- Article
POS-originated transaction traces as a source of contextual information for risk management systems in EFT transactions.
- Published in:
- EURASIP Journal on Information Security, 2018, v. 2018, n. 1, p. 1, doi. 10.1186/s13635-018-0076-9
- By:
- Publication type:
- Article
Foundations and applications of artificial Intelligence for zero-day and multi-step attack detection.
- Published in:
- EURASIP Journal on Information Security, 2018, v. 2018, n. 1, p. 1, doi. 10.1186/s13635-018-0074-y
- By:
- Publication type:
- Article
Security evaluation of Tree Parity Re-keying Machine implementations utilizing side-channel emissions.
- Published in:
- EURASIP Journal on Information Security, 2018, v. 2018, n. 1, p. 1, doi. 10.1186/s13635-018-0073-z
- By:
- Publication type:
- Article
Towards constructive approach to end-to-end slice isolation in 5G networks.
- Published in:
- EURASIP Journal on Information Security, 2018, v. 2018, n. 1, p. 1, doi. 10.1186/s13635-018-0072-0
- By:
- Publication type:
- Article
A trusted measurement model based on dynamic policy and privacy protection in IaaS security domain.
- Published in:
- EURASIP Journal on Information Security, 2018, v. 2018, n. 1, p. 0, doi. 10.1186/s13635-018-0071-1
- By:
- Publication type:
- Article