Stop the war!
Остановите войну!
for scientists:
default search action
EURASIP Journal on Information Security, Volume 2024
Volume 2024, Number 1, December 2024
- (Withdrawn) Research on privacy and secure storage protection of personalized medical data based on hybrid encryption. 1
- (Withdrawn) IoT devices and data availability optimization by ANN and KNN. 2
- (Withdrawn) Improved RFID mutual authentication protocol against exhaustive attack in the context of big data. 3
- (Withdrawn) Efficient identity security authentication method based on improved R-LWE algorithm in IoT environment. 4
- (Withdrawn) RFID tag recognition model for Internet of Things for training room management. 5
- (Withdrawn) Network security threat detection technology based on EPSO-BP algorithm. 6
- Arslan Ali, Andrea Migliorati, Tiziano Bianchi, Enrico Magli:
Cancelable templates for secure face verification based on deep learning and random projections. 7 - Mathappan Nivaashini, Suganya Elavarasan, Sountharrajan Sehar, M. Prabu, Durga Prasad Bavirisetti:
FEDDBN-IDS: federated deep belief network-based wireless network intrusion detection system. 8 - Kiran Saleem, Lei Wang, Salil Bharany, Khmaies Ouahada, Ateeq Ur Rehman, Habib Hamam:
Intelligent multi-agent model for energy-efficient communication in wireless sensor networks. 9 - Anum Paracha, Junaid Arshad, Mohamed Ben Farah, Khalid Ismail:
Machine learning security and privacy: a review of threats and countermeasures. 10 - Retraction Note: Network security threat detection technology based on EPSO-BP algorithm. 11
- Retraction Note: IoT devices and data availability optimization by ANN and KNN. 12
- Retraction Note: Efficient identity security authentication method based on improved R-LWE algorithm in IoT environment. 13
- Retraction Note: Node fault diagnosis algorithm for wireless sensor networks based on BN and WSN. 14
- Retraction Note: Research on privacy and secure storage protection of personalized medical data based on hybrid encryption. 15
- Retraction Note: Improved RFID mutual authentication protocol against exhaustive attack in the context of big data. 16
- Retraction Note: Hierarchical energy-saving routing algorithm using fuzzy logic in wireless sensor networks. 17
- Retraction Note: The design of network security protection trust management system based on an improved hidden Markov model. 18
- Retraction Note: RFID tag recognition model for Internet of Things for training room management. 19
- Arkan Hammoodi Hasan Kabla, Achmad Husni Thamrin, Mohammed Anbar, Selvakumar Manickam, Shankar Karuppayah:
Peer-to-peer botnets: exploring behavioural characteristics and machine/deep learning-based detection. 20
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.