


default search action
EURASIP Journal on Information Security, Volume 2019
Volume 2019, 2019
- Juan Zhao, Sachin Shetty  , Jan Wei Pan, Charles A. Kamhoua, Kevin A. Kwiat: , Jan Wei Pan, Charles A. Kamhoua, Kevin A. Kwiat:
 Transfer learning for detecting unknown network attacks. 1
- Fabian Knirsch, Andreas Unterweger  , Dominik Engel: , Dominik Engel:
 Implementing a blockchain from scratch: why, how, and what we learned. 2
- Yahong Hu  , Xia Sheng, Jiafa Mao, Kaihui Wang, Danhong Zhong: , Xia Sheng, Jiafa Mao, Kaihui Wang, Danhong Zhong:
 Spark-based real-time proactive image tracking protection model. 3
- Suleiman Y. Yerima, Mohammed K. Alzaylaee  , Sakir Sezer: , Sakir Sezer:
 Machine learning-based dynamic analysis of Android apps with improved code coverage. 4
- Xing Fang  , Maochao Xu, Shouhuai Xu, Peng Zhao: , Maochao Xu, Shouhuai Xu, Peng Zhao:
 A deep learning framework for predicting cyber attacks rates. 5
- Pallavi Deshpande, Prachi Mukherji  , Anil S. Tavildar: , Anil S. Tavildar:
 Accuracy enhancement of biometric recognition using iterative weights optimization algorithm. 6
- Christian Gehrmann  , Marcus Rodan, Niklas Jönsson: , Marcus Rodan, Niklas Jönsson:
 Metadata filtering for user-friendly centralized biometric authentication. 7
- Chengli Zhang  , Wenping Ma, Hefeng Chen, Feifei Zhao: , Wenping Ma, Hefeng Chen, Feifei Zhao:
 A new method of generating hard random lattices with short bases. 8
- Fitzroy Nembhard  , Marco M. Carvalho , Marco M. Carvalho , Thomas C. Eskridge , Thomas C. Eskridge : :
 Towards the application of recommender systems to secure coding. 9
- Stefano Giovanni Rizzo  , Flavio Bertini , Flavio Bertini , Danilo Montesi , Danilo Montesi : :
 Fine-grain watermarking for intellectual property protection. 10
- Riwa Mouawi  , Imad H. Elhajj , Imad H. Elhajj , Ali Chehab , Ali Chehab , Ayman I. Kayssi: , Ayman I. Kayssi:
 Crowdsourcing for click fraud detection. 11
- Taras Stanko, Bin Chen  , Boris Skoric , Boris Skoric : :
 Fingerprint template protection using minutia-pair spectral representations. 12
- Wenjun Yang, Jiaying Zhang  , Chundong Wang, Xiu-liang Mo: , Chundong Wang, Xiu-liang Mo:
 Situation prediction of large-scale Internet of Things network security. 13
- Kubilay Ahmet Küçük  , David Grawrock, Andrew Martin: , David Grawrock, Andrew Martin:
 Managing confidentiality leaks through private algorithms on Software Guard eXtensions (SGX) enclaves. 14
- Johannes Buchmann, Matthias Geihs, Kay Hamacher, Stefan Katzenbeisser, Sebastian Stammler  : :
 Long-term integrity protection of genomic data. 15
- Jivitesh Sharma  , Charul Giri, Ole-Christoffer Granmo, Morten Goodwin: , Charul Giri, Ole-Christoffer Granmo, Morten Goodwin:
 Multi-layer intrusion detection system with ExtraTrees feature selection, extreme learning machine ensemble, and softmax aggregation. 16

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


 Google
Google Google Scholar
Google Scholar Semantic Scholar
Semantic Scholar Internet Archive Scholar
Internet Archive Scholar CiteSeerX
CiteSeerX ORCID
ORCID














