Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/journals/ejisec/ejisec2019.bht:"
@article{DBLP:journals/ejisec/BuchmannGHKS19, author = {Johannes Buchmann and Matthias Geihs and Kay Hamacher and Stefan Katzenbeisser and Sebastian Stammler}, title = {Long-term integrity protection of genomic data}, journal = {{EURASIP} J. Inf. Secur.}, volume = {2019}, pages = {15}, year = {2019}, url = {https://doi.org/10.1186/s13635-019-0099-x}, doi = {10.1186/S13635-019-0099-X}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ejisec/BuchmannGHKS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejisec/DeshpandeMT19, author = {Pallavi Deshpande and Prachi Mukherji and Anil S. Tavildar}, title = {Accuracy enhancement of biometric recognition using iterative weights optimization algorithm}, journal = {{EURASIP} J. Inf. Secur.}, volume = {2019}, pages = {6}, year = {2019}, url = {https://doi.org/10.1186/s13635-019-0089-z}, doi = {10.1186/S13635-019-0089-Z}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ejisec/DeshpandeMT19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejisec/FangXXZ19, author = {Xing Fang and Maochao Xu and Shouhuai Xu and Peng Zhao}, title = {A deep learning framework for predicting cyber attacks rates}, journal = {{EURASIP} J. Inf. Secur.}, volume = {2019}, pages = {5}, year = {2019}, url = {https://doi.org/10.1186/s13635-019-0090-6}, doi = {10.1186/S13635-019-0090-6}, timestamp = {Thu, 18 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ejisec/FangXXZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejisec/GehrmannRJ19, author = {Christian Gehrmann and Marcus Rodan and Niklas J{\"{o}}nsson}, title = {Metadata filtering for user-friendly centralized biometric authentication}, journal = {{EURASIP} J. Inf. Secur.}, volume = {2019}, pages = {7}, year = {2019}, url = {https://doi.org/10.1186/s13635-019-0093-3}, doi = {10.1186/S13635-019-0093-3}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ejisec/GehrmannRJ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejisec/HuSMWZ19, author = {Yahong Hu and Xia Sheng and Jiafa Mao and Kaihui Wang and Danhong Zhong}, title = {Spark-based real-time proactive image tracking protection model}, journal = {{EURASIP} J. Inf. Secur.}, volume = {2019}, pages = {3}, year = {2019}, url = {https://doi.org/10.1186/s13635-019-0086-2}, doi = {10.1186/S13635-019-0086-2}, timestamp = {Thu, 18 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ejisec/HuSMWZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejisec/KnirschUE19, author = {Fabian Knirsch and Andreas Unterweger and Dominik Engel}, title = {Implementing a blockchain from scratch: why, how, and what we learned}, journal = {{EURASIP} J. Inf. Secur.}, volume = {2019}, pages = {2}, year = {2019}, url = {https://doi.org/10.1186/s13635-019-0085-3}, doi = {10.1186/S13635-019-0085-3}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ejisec/KnirschUE19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejisec/KucukGM19, author = {Kubilay Ahmet K{\"{u}}{\c{c}}{\"{u}}k and David Grawrock and Andrew Martin}, title = {Managing confidentiality leaks through private algorithms on Software Guard eXtensions {(SGX)} enclaves}, journal = {{EURASIP} J. Inf. Secur.}, volume = {2019}, pages = {14}, year = {2019}, url = {https://doi.org/10.1186/s13635-019-0091-5}, doi = {10.1186/S13635-019-0091-5}, timestamp = {Tue, 26 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ejisec/KucukGM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejisec/MouawiECK19, author = {Riwa Mouawi and Imad H. Elhajj and Ali Chehab and Ayman I. Kayssi}, title = {Crowdsourcing for click fraud detection}, journal = {{EURASIP} J. Inf. Secur.}, volume = {2019}, pages = {11}, year = {2019}, url = {https://doi.org/10.1186/s13635-019-0095-1}, doi = {10.1186/S13635-019-0095-1}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ejisec/MouawiECK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejisec/NembhardCE19, author = {Fitzroy Nembhard and Marco M. Carvalho and Thomas C. Eskridge}, title = {Towards the application of recommender systems to secure coding}, journal = {{EURASIP} J. Inf. Secur.}, volume = {2019}, pages = {9}, year = {2019}, url = {https://doi.org/10.1186/s13635-019-0092-4}, doi = {10.1186/S13635-019-0092-4}, timestamp = {Thu, 18 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ejisec/NembhardCE19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejisec/RizzoBM19, author = {Stefano Giovanni Rizzo and Flavio Bertini and Danilo Montesi}, title = {Fine-grain watermarking for intellectual property protection}, journal = {{EURASIP} J. Inf. Secur.}, volume = {2019}, pages = {10}, year = {2019}, url = {https://doi.org/10.1186/s13635-019-0094-2}, doi = {10.1186/S13635-019-0094-2}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ejisec/RizzoBM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejisec/SharmaGGG19, author = {Jivitesh Sharma and Charul Giri and Ole{-}Christoffer Granmo and Morten Goodwin}, title = {Multi-layer intrusion detection system with ExtraTrees feature selection, extreme learning machine ensemble, and softmax aggregation}, journal = {{EURASIP} J. Inf. Secur.}, volume = {2019}, pages = {16}, year = {2019}, url = {https://doi.org/10.1186/s13635-019-0098-y}, doi = {10.1186/S13635-019-0098-Y}, timestamp = {Thu, 18 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ejisec/SharmaGGG19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejisec/StankoCS19, author = {Taras Stanko and Bin Chen and Boris Skoric}, title = {Fingerprint template protection using minutia-pair spectral representations}, journal = {{EURASIP} J. Inf. Secur.}, volume = {2019}, pages = {12}, year = {2019}, url = {https://doi.org/10.1186/s13635-019-0096-0}, doi = {10.1186/S13635-019-0096-0}, timestamp = {Thu, 18 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ejisec/StankoCS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejisec/YangZWM19, author = {Wenjun Yang and Jiaying Zhang and Chundong Wang and Xiu{-}liang Mo}, title = {Situation prediction of large-scale Internet of Things network security}, journal = {{EURASIP} J. Inf. Secur.}, volume = {2019}, pages = {13}, year = {2019}, url = {https://doi.org/10.1186/s13635-019-0097-z}, doi = {10.1186/S13635-019-0097-Z}, timestamp = {Thu, 18 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ejisec/YangZWM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejisec/YerimaAS19, author = {Suleiman Y. Yerima and Mohammed K. Alzaylaee and Sakir Sezer}, title = {Machine learning-based dynamic analysis of Android apps with improved code coverage}, journal = {{EURASIP} J. Inf. Secur.}, volume = {2019}, pages = {4}, year = {2019}, url = {https://doi.org/10.1186/s13635-019-0087-1}, doi = {10.1186/S13635-019-0087-1}, timestamp = {Thu, 18 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ejisec/YerimaAS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejisec/ZhangMCZ19, author = {Chengli Zhang and Wenping Ma and Hefeng Chen and Feifei Zhao}, title = {A new method of generating hard random lattices with short bases}, journal = {{EURASIP} J. Inf. Secur.}, volume = {2019}, pages = {8}, year = {2019}, url = {https://doi.org/10.1186/s13635-019-0088-0}, doi = {10.1186/S13635-019-0088-0}, timestamp = {Thu, 18 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ejisec/ZhangMCZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejisec/ZhaoSPKK19, author = {Juan Zhao and Sachin Shetty and Jan Wei Pan and Charles A. Kamhoua and Kevin A. Kwiat}, title = {Transfer learning for detecting unknown network attacks}, journal = {{EURASIP} J. Inf. Secur.}, volume = {2019}, pages = {1}, year = {2019}, url = {https://doi.org/10.1186/s13635-019-0084-4}, doi = {10.1186/S13635-019-0084-4}, timestamp = {Tue, 08 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ejisec/ZhaoSPKK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.