Search dblp for Publications

export results for "toc:db/journals/ejisec/ejisec2019.bht:"

 download as .bib file

@article{DBLP:journals/ejisec/BuchmannGHKS19,
  author       = {Johannes Buchmann and
                  Matthias Geihs and
                  Kay Hamacher and
                  Stefan Katzenbeisser and
                  Sebastian Stammler},
  title        = {Long-term integrity protection of genomic data},
  journal      = {{EURASIP} J. Inf. Secur.},
  volume       = {2019},
  pages        = {15},
  year         = {2019},
  url          = {https://doi.org/10.1186/s13635-019-0099-x},
  doi          = {10.1186/S13635-019-0099-X},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ejisec/BuchmannGHKS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejisec/DeshpandeMT19,
  author       = {Pallavi Deshpande and
                  Prachi Mukherji and
                  Anil S. Tavildar},
  title        = {Accuracy enhancement of biometric recognition using iterative weights
                  optimization algorithm},
  journal      = {{EURASIP} J. Inf. Secur.},
  volume       = {2019},
  pages        = {6},
  year         = {2019},
  url          = {https://doi.org/10.1186/s13635-019-0089-z},
  doi          = {10.1186/S13635-019-0089-Z},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ejisec/DeshpandeMT19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejisec/FangXXZ19,
  author       = {Xing Fang and
                  Maochao Xu and
                  Shouhuai Xu and
                  Peng Zhao},
  title        = {A deep learning framework for predicting cyber attacks rates},
  journal      = {{EURASIP} J. Inf. Secur.},
  volume       = {2019},
  pages        = {5},
  year         = {2019},
  url          = {https://doi.org/10.1186/s13635-019-0090-6},
  doi          = {10.1186/S13635-019-0090-6},
  timestamp    = {Thu, 18 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ejisec/FangXXZ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejisec/GehrmannRJ19,
  author       = {Christian Gehrmann and
                  Marcus Rodan and
                  Niklas J{\"{o}}nsson},
  title        = {Metadata filtering for user-friendly centralized biometric authentication},
  journal      = {{EURASIP} J. Inf. Secur.},
  volume       = {2019},
  pages        = {7},
  year         = {2019},
  url          = {https://doi.org/10.1186/s13635-019-0093-3},
  doi          = {10.1186/S13635-019-0093-3},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ejisec/GehrmannRJ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejisec/HuSMWZ19,
  author       = {Yahong Hu and
                  Xia Sheng and
                  Jiafa Mao and
                  Kaihui Wang and
                  Danhong Zhong},
  title        = {Spark-based real-time proactive image tracking protection model},
  journal      = {{EURASIP} J. Inf. Secur.},
  volume       = {2019},
  pages        = {3},
  year         = {2019},
  url          = {https://doi.org/10.1186/s13635-019-0086-2},
  doi          = {10.1186/S13635-019-0086-2},
  timestamp    = {Thu, 18 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ejisec/HuSMWZ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejisec/KnirschUE19,
  author       = {Fabian Knirsch and
                  Andreas Unterweger and
                  Dominik Engel},
  title        = {Implementing a blockchain from scratch: why, how, and what we learned},
  journal      = {{EURASIP} J. Inf. Secur.},
  volume       = {2019},
  pages        = {2},
  year         = {2019},
  url          = {https://doi.org/10.1186/s13635-019-0085-3},
  doi          = {10.1186/S13635-019-0085-3},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ejisec/KnirschUE19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejisec/KucukGM19,
  author       = {Kubilay Ahmet K{\"{u}}{\c{c}}{\"{u}}k and
                  David Grawrock and
                  Andrew Martin},
  title        = {Managing confidentiality leaks through private algorithms on Software
                  Guard eXtensions {(SGX)} enclaves},
  journal      = {{EURASIP} J. Inf. Secur.},
  volume       = {2019},
  pages        = {14},
  year         = {2019},
  url          = {https://doi.org/10.1186/s13635-019-0091-5},
  doi          = {10.1186/S13635-019-0091-5},
  timestamp    = {Tue, 26 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ejisec/KucukGM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejisec/MouawiECK19,
  author       = {Riwa Mouawi and
                  Imad H. Elhajj and
                  Ali Chehab and
                  Ayman I. Kayssi},
  title        = {Crowdsourcing for click fraud detection},
  journal      = {{EURASIP} J. Inf. Secur.},
  volume       = {2019},
  pages        = {11},
  year         = {2019},
  url          = {https://doi.org/10.1186/s13635-019-0095-1},
  doi          = {10.1186/S13635-019-0095-1},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ejisec/MouawiECK19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejisec/NembhardCE19,
  author       = {Fitzroy Nembhard and
                  Marco M. Carvalho and
                  Thomas C. Eskridge},
  title        = {Towards the application of recommender systems to secure coding},
  journal      = {{EURASIP} J. Inf. Secur.},
  volume       = {2019},
  pages        = {9},
  year         = {2019},
  url          = {https://doi.org/10.1186/s13635-019-0092-4},
  doi          = {10.1186/S13635-019-0092-4},
  timestamp    = {Thu, 18 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ejisec/NembhardCE19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejisec/RizzoBM19,
  author       = {Stefano Giovanni Rizzo and
                  Flavio Bertini and
                  Danilo Montesi},
  title        = {Fine-grain watermarking for intellectual property protection},
  journal      = {{EURASIP} J. Inf. Secur.},
  volume       = {2019},
  pages        = {10},
  year         = {2019},
  url          = {https://doi.org/10.1186/s13635-019-0094-2},
  doi          = {10.1186/S13635-019-0094-2},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ejisec/RizzoBM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejisec/SharmaGGG19,
  author       = {Jivitesh Sharma and
                  Charul Giri and
                  Ole{-}Christoffer Granmo and
                  Morten Goodwin},
  title        = {Multi-layer intrusion detection system with ExtraTrees feature selection,
                  extreme learning machine ensemble, and softmax aggregation},
  journal      = {{EURASIP} J. Inf. Secur.},
  volume       = {2019},
  pages        = {16},
  year         = {2019},
  url          = {https://doi.org/10.1186/s13635-019-0098-y},
  doi          = {10.1186/S13635-019-0098-Y},
  timestamp    = {Thu, 18 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ejisec/SharmaGGG19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejisec/StankoCS19,
  author       = {Taras Stanko and
                  Bin Chen and
                  Boris Skoric},
  title        = {Fingerprint template protection using minutia-pair spectral representations},
  journal      = {{EURASIP} J. Inf. Secur.},
  volume       = {2019},
  pages        = {12},
  year         = {2019},
  url          = {https://doi.org/10.1186/s13635-019-0096-0},
  doi          = {10.1186/S13635-019-0096-0},
  timestamp    = {Thu, 18 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ejisec/StankoCS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejisec/YangZWM19,
  author       = {Wenjun Yang and
                  Jiaying Zhang and
                  Chundong Wang and
                  Xiu{-}liang Mo},
  title        = {Situation prediction of large-scale Internet of Things network security},
  journal      = {{EURASIP} J. Inf. Secur.},
  volume       = {2019},
  pages        = {13},
  year         = {2019},
  url          = {https://doi.org/10.1186/s13635-019-0097-z},
  doi          = {10.1186/S13635-019-0097-Z},
  timestamp    = {Thu, 18 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ejisec/YangZWM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejisec/YerimaAS19,
  author       = {Suleiman Y. Yerima and
                  Mohammed K. Alzaylaee and
                  Sakir Sezer},
  title        = {Machine learning-based dynamic analysis of Android apps with improved
                  code coverage},
  journal      = {{EURASIP} J. Inf. Secur.},
  volume       = {2019},
  pages        = {4},
  year         = {2019},
  url          = {https://doi.org/10.1186/s13635-019-0087-1},
  doi          = {10.1186/S13635-019-0087-1},
  timestamp    = {Thu, 18 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ejisec/YerimaAS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejisec/ZhangMCZ19,
  author       = {Chengli Zhang and
                  Wenping Ma and
                  Hefeng Chen and
                  Feifei Zhao},
  title        = {A new method of generating hard random lattices with short bases},
  journal      = {{EURASIP} J. Inf. Secur.},
  volume       = {2019},
  pages        = {8},
  year         = {2019},
  url          = {https://doi.org/10.1186/s13635-019-0088-0},
  doi          = {10.1186/S13635-019-0088-0},
  timestamp    = {Thu, 18 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ejisec/ZhangMCZ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejisec/ZhaoSPKK19,
  author       = {Juan Zhao and
                  Sachin Shetty and
                  Jan Wei Pan and
                  Charles A. Kamhoua and
                  Kevin A. Kwiat},
  title        = {Transfer learning for detecting unknown network attacks},
  journal      = {{EURASIP} J. Inf. Secur.},
  volume       = {2019},
  pages        = {1},
  year         = {2019},
  url          = {https://doi.org/10.1186/s13635-019-0084-4},
  doi          = {10.1186/S13635-019-0084-4},
  timestamp    = {Tue, 08 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ejisec/ZhaoSPKK19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics