Stop the war!
Остановите войну!
for scientists:
default search action
EURASIP Journal on Information Security, Volume 2019
Volume 2019, 2019
- Juan Zhao, Sachin Shetty, Jan Wei Pan, Charles A. Kamhoua, Kevin A. Kwiat:
Transfer learning for detecting unknown network attacks. 1 - Fabian Knirsch, Andreas Unterweger, Dominik Engel:
Implementing a blockchain from scratch: why, how, and what we learned. 2 - Yahong Hu, Xia Sheng, Jiafa Mao, Kaihui Wang, Danhong Zhong:
Spark-based real-time proactive image tracking protection model. 3 - Suleiman Y. Yerima, Mohammed K. Alzaylaee, Sakir Sezer:
Machine learning-based dynamic analysis of Android apps with improved code coverage. 4 - Xing Fang, Maochao Xu, Shouhuai Xu, Peng Zhao:
A deep learning framework for predicting cyber attacks rates. 5 - Pallavi Deshpande, Prachi Mukherji, Anil S. Tavildar:
Accuracy enhancement of biometric recognition using iterative weights optimization algorithm. 6 - Christian Gehrmann, Marcus Rodan, Niklas Jönsson:
Metadata filtering for user-friendly centralized biometric authentication. 7 - Chengli Zhang, Wenping Ma, Hefeng Chen, Feifei Zhao:
A new method of generating hard random lattices with short bases. 8 - Fitzroy Nembhard, Marco M. Carvalho, Thomas C. Eskridge:
Towards the application of recommender systems to secure coding. 9 - Stefano Giovanni Rizzo, Flavio Bertini, Danilo Montesi:
Fine-grain watermarking for intellectual property protection. 10 - Riwa Mouawi, Imad H. Elhajj, Ali Chehab, Ayman I. Kayssi:
Crowdsourcing for click fraud detection. 11 - Taras Stanko, Bin Chen, Boris Skoric:
Fingerprint template protection using minutia-pair spectral representations. 12 - Wenjun Yang, Jiaying Zhang, Chundong Wang, Xiu-liang Mo:
Situation prediction of large-scale Internet of Things network security. 13 - Kubilay Ahmet Küçük, David Grawrock, Andrew Martin:
Managing confidentiality leaks through private algorithms on Software Guard eXtensions (SGX) enclaves. 14 - Johannes Buchmann, Matthias Geihs, Kay Hamacher, Stefan Katzenbeisser, Sebastian Stammler:
Long-term integrity protection of genomic data. 15 - Jivitesh Sharma, Charul Giri, Ole-Christoffer Granmo, Morten Goodwin:
Multi-layer intrusion detection system with ExtraTrees feature selection, extreme learning machine ensemble, and softmax aggregation. 16
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.