Works matching IS 16874161 AND DT 2025 AND VI 2025 AND IP 1
Results: 13
Mitigate authentication attack risk on cancelable biometrics by leveraging attacker knowledge.
- Published in:
- EURASIP Journal on Information Security, 2025, v. 2025, n. 1, p. 1, doi. 10.1186/s13635-025-00198-3
- By:
- Publication type:
- Article
Designing a security incident response process for self-sovereign identities.
- Published in:
- EURASIP Journal on Information Security, 2025, v. 2025, n. 1, p. 1, doi. 10.1186/s13635-025-00195-6
- By:
- Publication type:
- Article
BERT-based network for intrusion detection system.
- Published in:
- EURASIP Journal on Information Security, 2025, v. 2025, n. 1, p. 1, doi. 10.1186/s13635-025-00191-w
- By:
- Publication type:
- Article
Malicious software identification based on deep learning algorithms and API feature extraction.
- Published in:
- EURASIP Journal on Information Security, 2025, v. 2025, n. 1, p. 1, doi. 10.1186/s13635-025-00197-4
- By:
- Publication type:
- Article
Universal share-based two-in-one multi-image secret sharing scheme by rotating random grids.
- Published in:
- EURASIP Journal on Information Security, 2025, v. 2025, n. 1, p. 1, doi. 10.1186/s13635-024-00185-0
- By:
- Publication type:
- Article
Hiding identities of MQTT devices against a global network adversary.
- Published in:
- EURASIP Journal on Information Security, 2025, v. 2025, n. 1, p. 1, doi. 10.1186/s13635-025-00194-7
- By:
- Publication type:
- Article
Activity-aware electrocardiogram biometric verification utilising deep learning on wearable devices.
- Published in:
- EURASIP Journal on Information Security, 2025, v. 2025, n. 1, p. 1, doi. 10.1186/s13635-025-00193-8
- By:
- Publication type:
- Article
Optimizing signature space performance in privacy-enhanced blockchains: novel ring signature solutions.
- Published in:
- EURASIP Journal on Information Security, 2025, v. 2025, n. 1, p. 1, doi. 10.1186/s13635-025-00192-9
- By:
- Publication type:
- Article
MIDALF—multimodal image and audio late fusion for malware detection.
- Published in:
- EURASIP Journal on Information Security, 2025, v. 2025, n. 1, p. 1, doi. 10.1186/s13635-025-00188-5
- By:
- Publication type:
- Article
Content blocking mechanism in cybersecurity: Slovakia case study.
- Published in:
- EURASIP Journal on Information Security, 2025, v. 2025, n. 1, p. 1, doi. 10.1186/s13635-025-00190-x
- By:
- Publication type:
- Article
Robust face forgery detection integrating local texture and global texture information.
- Published in:
- EURASIP Journal on Information Security, 2025, v. 2025, n. 1, p. 1, doi. 10.1186/s13635-025-00189-4
- By:
- Publication type:
- Article
Navigating secure storage requirements for EUDI Wallets: a review paper.
- Published in:
- EURASIP Journal on Information Security, 2025, v. 2025, n. 1, p. 1, doi. 10.1186/s13635-025-00187-6
- By:
- Publication type:
- Article
Securing cyber-physical robotic systems for enhanced data security and real-time threat mitigation.
- Published in:
- EURASIP Journal on Information Security, 2025, v. 2025, n. 1, p. 1, doi. 10.1186/s13635-025-00186-7
- By:
- Publication type:
- Article