Works matching IS 16874161 AND DT 2024 AND VI 2024 AND IP 1
Results: 33
DCNN: a novel binary and multi-class network intrusion detection model via deep convolutional neural network.
- Published in:
- EURASIP Journal on Information Security, 2024, v. 2024, n. 1, p. 1, doi. 10.1186/s13635-024-00184-1
- By:
- Publication type:
- Article
Reinforcing cybersecurity with Bloom filters: a novel approach to password cracking efficiency.
- Published in:
- EURASIP Journal on Information Security, 2024, v. 2024, n. 1, p. 1, doi. 10.1186/s13635-024-00183-2
- By:
- Publication type:
- Article
Static analysis framework for permission-based dataset generation and android malware detection using machine learning.
- Published in:
- EURASIP Journal on Information Security, 2024, v. 2024, n. 1, p. 1, doi. 10.1186/s13635-024-00182-3
- By:
- Publication type:
- Article
CoFFEE: a codec-based forensic feature extraction and evaluation software for H.264 videos.
- Published in:
- EURASIP Journal on Information Security, 2024, v. 2024, n. 1, p. 1, doi. 10.1186/s13635-024-00181-4
- By:
- Publication type:
- Article
Enhancing internet of things security using entropy-informed RF-DNA fingerprint learning from Gabor-based images.
- Published in:
- EURASIP Journal on Information Security, 2024, v. 2024, n. 1, p. 1, doi. 10.1186/s13635-024-00175-2
- By:
- Publication type:
- Article
Cancelable palmprint: intelligent framework toward secure and privacy-aware recognition system.
- Published in:
- EURASIP Journal on Information Security, 2024, v. 2024, n. 1, p. 1, doi. 10.1186/s13635-024-00179-y
- By:
- Publication type:
- Article
Access control for trusted data sharing.
- Published in:
- EURASIP Journal on Information Security, 2024, v. 2024, n. 1, p. 1, doi. 10.1186/s13635-024-00178-z
- By:
- Publication type:
- Article
DQ-NN and phantom routing for enhanced source location privacy for IoT under multiple source and destination.
- Published in:
- EURASIP Journal on Information Security, 2024, v. 2024, n. 1, p. 1, doi. 10.1186/s13635-024-00176-1
- By:
- Publication type:
- Article
Trajectory-aware privacy-preserving method with local differential privacy in crowdsourcing.
- Published in:
- EURASIP Journal on Information Security, 2024, v. 2024, n. 1, p. 1, doi. 10.1186/s13635-024-00177-0
- By:
- Publication type:
- Article
Strategic safeguarding: A game theoretic approach for analyzing attacker-defender behavior in DNN backdoors.
- Published in:
- EURASIP Journal on Information Security, 2024, v. 2024, n. 1, p. 1, doi. 10.1186/s13635-024-00180-5
- By:
- Publication type:
- Article
Cover-source mismatch in steganalysis: systematic review.
- Published in:
- EURASIP Journal on Information Security, 2024, v. 2024, n. 1, p. 1, doi. 10.1186/s13635-024-00171-6
- By:
- Publication type:
- Article
HyperWallet: cryptocurrency wallet as a secure hypervisor-based application.
- Published in:
- EURASIP Journal on Information Security, 2024, v. 2024, n. 1, p. 1, doi. 10.1186/s13635-024-00159-2
- By:
- Publication type:
- Article
Reversible anonymization for privacy of facial biometrics via cyclic learning.
- Published in:
- EURASIP Journal on Information Security, 2024, v. 2024, n. 1, p. 1, doi. 10.1186/s13635-024-00174-3
- By:
- Publication type:
- Article
Performance comparison of quantum-safe multivariate polynomial public key encapsulation algorithm.
- Published in:
- EURASIP Journal on Information Security, 2024, v. 2024, n. 1, p. 1, doi. 10.1186/s13635-024-00170-7
- By:
- Publication type:
- Article
Errorless robust JPEG steganography using steganographic polar codes.
- Published in:
- EURASIP Journal on Information Security, 2024, v. 2024, n. 1, p. 1, doi. 10.1186/s13635-024-00173-4
- By:
- Publication type:
- Article
Mining digital identity insights: patent analysis using NLP.
- Published in:
- EURASIP Journal on Information Security, 2024, v. 2024, n. 1, p. 1, doi. 10.1186/s13635-024-00172-5
- By:
- Publication type:
- Article
Peer-to-peer botnets: exploring behavioural characteristics and machine/deep learning-based detection.
- Published in:
- EURASIP Journal on Information Security, 2024, v. 2024, n. 1, p. 1, doi. 10.1186/s13635-024-00169-0
- By:
- Publication type:
- Article
Retraction Note: Hierarchical energy-saving routing algorithm using fuzzy logic in wireless sensor networks.
- Published in:
- 2024
- By:
- Publication type:
- Correction Notice
Retraction Note: The design of network security protection trust management system based on an improved hidden Markov model.
- Published in:
- 2024
- By:
- Publication type:
- Correction Notice
Retraction Note: Node fault diagnosis algorithm for wireless sensor networks based on BN and WSN.
- Published in:
- 2024
- By:
- Publication type:
- Correction Notice
Retraction Note: Research on privacy and secure storage protection of personalized medical data based on hybrid encryption.
- Published in:
- 2024
- By:
- Publication type:
- Correction Notice
Retraction Note: Improved RFID mutual authentication protocol against exhaustive attack in the context of big data.
- Published in:
- 2024
- By:
- Publication type:
- Correction Notice
Retraction Note: Efficient identity security authentication method based on improved R-LWE algorithm in IoT environment.
- Published in:
- 2024
- By:
- Publication type:
- Correction Notice
Retraction Note: Network security threat detection technology based on EPSO-BP algorithm.
- Published in:
- 2024
- By:
- Publication type:
- Correction Notice
Machine learning security and privacy: a review of threats and countermeasures.
- Published in:
- EURASIP Journal on Information Security, 2024, v. 2024, n. 1, p. 1, doi. 10.1186/s13635-024-00158-3
- By:
- Publication type:
- Article
Intelligent multi-agent model for energy-efficient communication in wireless sensor networks.
- Published in:
- EURASIP Journal on Information Security, 2024, v. 2024, n. 1, p. 1, doi. 10.1186/s13635-024-00155-6
- By:
- Publication type:
- Article
FEDDBN-IDS: federated deep belief network-based wireless network intrusion detection system.
- Published in:
- EURASIP Journal on Information Security, 2024, v. 2024, n. 1, p. 1, doi. 10.1186/s13635-024-00156-5
- By:
- Publication type:
- Article
Cancelable templates for secure face verification based on deep learning and random projections.
- Published in:
- EURASIP Journal on Information Security, 2024, v. 2024, n. 1, p. 1, doi. 10.1186/s13635-023-00147-y
- By:
- Publication type:
- Article
RFID tag recognition model for Internet of Things for training room management.
- Published in:
- EURASIP Journal on Information Security, 2024, v. 2024, n. 1, p. 1, doi. 10.1186/s13635-024-00154-7
- By:
- Publication type:
- Article
Network security threat detection technology based on EPSO-BP algorithm.
- Published in:
- EURASIP Journal on Information Security, 2024, v. 2024, n. 1, p. 1, doi. 10.1186/s13635-024-00152-9
- By:
- Publication type:
- Article
Efficient identity security authentication method based on improved R-LWE algorithm in IoT environment.
- Published in:
- EURASIP Journal on Information Security, 2024, v. 2024, n. 1, p. 1, doi. 10.1186/s13635-024-00153-8
- By:
- Publication type:
- Article
Research on privacy and secure storage protection of personalized medical data based on hybrid encryption.
- Published in:
- EURASIP Journal on Information Security, 2024, v. 2024, n. 1, p. 1, doi. 10.1186/s13635-023-00150-3
- By:
- Publication type:
- Article
IoT devices and data availability optimization by ANN and KNN.
- Published in:
- EURASIP Journal on Information Security, 2024, v. 2024, n. 1, p. 1, doi. 10.1186/s13635-023-00145-0
- By:
- Publication type:
- Article