Sort by
Previous Page Page 1 of 6 Next Page
  1. Research

    Sensor Guardian: prevent privacy inference on Android sensors

    Privacy inference attacks based on sensor data is an emerging and severe threat on smart devices, in which malicious applications leverage data from innocuous sensors to infer sensitive information of user, e....

    Xiaolong Bai, Jie Yin and Yu-Ping Wang

    EURASIP Journal on Information Security 2017 2017:10

    Published on: 8 June 2017

  2. Research

    On the use of watermark-based schemes to detect cyber-physical attacks

    We address security issues in cyber-physical systems (CPSs). We focus on the detection of attacks against cyber-physical systems. Attacks against these systems shall be handled both in terms of safety and secu...

    Jose Rubio-Hernan, Luca De Cicco and Joaquin Garcia-Alfaro

    EURASIP Journal on Information Security 2017 2017:8

    Published on: 2 June 2017

  3. Research

    An artificial immunity approach to malware detection in a mobile platform

    Inspired by the human immune system, we explore the development of a new Multiple-Detector Set Artificial Immune System (mAIS) for the detection of mobile malware based on the information flows in Android apps...

    James Brown, Mohd Anwar and Gerry Dozier

    EURASIP Journal on Information Security 2017 2017:7

    Published on: 27 March 2017

  4. Research

    Multi-resolution privacy-enhancing technologies for smart metering

    The availability of individual load profiles per household in the smart grid end-user domain combined with non-intrusive load monitoring to infer personal data from these load curves has led to privacy concern...

    Fabian Knirsch, Günther Eibl and Dominik Engel

    EURASIP Journal on Information Security 2017 2017:6

    Published on: 20 March 2017

  5. Research

    Anomaly detection through information sharing under different topologies

    Early detection of traffic anomalies in networks increases the probability of effective intervention/mitigation actions, thereby improving the stability of system function. Centralized methods of anomaly detec...

    Lazaros K. Gallos, Maciej Korczyński and Nina H. Fefferman

    EURASIP Journal on Information Security 2017 2017:5

    Published on: 28 February 2017

  6. Research

    Honeypots and honeynets: issues of privacy

    Honeypots and honeynets are popular tools in the area of network security and network forensics. The deployment and usage of these tools are influenced by a number of technical and legal issues, which need to ...

    Pavol Sokol, Jakub Míšek and Martin Husák

    EURASIP Journal on Information Security 2017 2017:4

    Published on: 28 February 2017

  7. Research

    Improved privacy of dynamic group services

    We consider dynamic group services, where outputs based on small samples of privacy-sensitive user inputs are repetitively computed. The leakage of user input data is analysed, caused by producing multiple out...

    Thijs Veugen, Jeroen Doumen, Zekeriya Erkin, Gaetano Pellegrino, Sicco Verwer and Jos Weber

    EURASIP Journal on Information Security 2017 2017:3

    Published on: 1 February 2017

  8. Research

    A novel quality assessment for visual secret sharing schemes

    To evaluate the visual quality in visual secret sharing schemes, most of the existing metrics fail to generate fair and uniform quality scores for tested reconstructed images. We propose a new approach to measure...

    Feng Jiang and Brian King

    EURASIP Journal on Information Security 2017 2017:1

    Published on: 19 January 2017

  9. Research

    Fuzzing binaries with Lévy flight swarms

    We present a new method for random testing of binary executables inspired by biology. In our approach, we introduce the first fuzzer based on a mathematical model for optimal foraging. To minimize search time ...

    Konstantin Böttinger

    EURASIP Journal on Information Security 2016 2016:28

    Published on: 21 November 2016

  10. Research

    Unlinkable improved multi-biometric iris fuzzy vault

    Iris recognition technologies are deployed in numerous large-scale nation-wide projects in order to provide robust and reliable biometric recognition of individuals. Moreover, the iris has been found to be rat...

    Christian Rathgeb, Benjamin Tams, Johannes Wagner and Christoph Busch

    EURASIP Journal on Information Security 2016 2016:26

    Published on: 2 November 2016

  11. Research

    Quality-based iris segmentation-level fusion

    Iris localisation and segmentation are challenging and critical tasks in iris biometric recognition. Especially in non-cooperative and less ideal environments, their impact on overall system performance has be...

    Peter Wild, Heinz Hofbauer, James Ferryman and Andreas Uhl

    EURASIP Journal on Information Security 2016 2016:25

    Published on: 26 October 2016

  12. Research

    Identification performance of evidential value estimation for ridge-based biometrics

    Law enforcement agencies around the world use ridge-based biometrics, especially fingerprints, to fight crime. Fingermarks that are left at a crime scene and identified as potentially having evidential value (...

    Johannes Kotzerke, Hao Hao, Stephen A. Davis, Robert Hayes, L. J. Spreeuwers, R. N. J. Veldhuis and K. J. Horadam

    EURASIP Journal on Information Security 2016 2016:24

    Published on: 26 October 2016

  13. Research

    Privacy-preserving load profile matching for tariff decisions in smart grids

    In liberalized energy markets, matching consumption patterns to energy tariffs is desirable, but practically limited due to privacy concerns, both on the side of the consumer and on the side of the utilities. ...

    Andreas Unterweger, Fabian Knirsch, Günther Eibl and Dominik Engel

    EURASIP Journal on Information Security 2016 2016:21

    Published on: 26 September 2016

  14. Research

    Hidost: a static machine-learning-based detector of malicious files

    Malicious software, i.e., malware, has been a persistent threat in the information security landscape since the early days of personal computing. The recent targeted attacks extensively use non-executable malw...

    Nedim Šrndić and Pavel Laskov

    EURASIP Journal on Information Security 2016 2016:22

    Published on: 26 September 2016

  15. Research

    DST approach to enhance audio quality on lost audio packet steganography

    Lost audio packet steganography (LACK) is a steganography technique established on the VoIP network. LACK provides a high-capacity covert channel over VoIP network by artificially delaying and dropping a numbe...

    Qilin Qi, Dongming Peng and Hamid Sharif

    EURASIP Journal on Information Security 2016 2016:20

    Published on: 23 September 2016

  16. Research

    Adaptive identity and access management—contextual data based policies

    Due to compliance and IT security requirements, company-wide identity and access management within organizations has gained significant importance in research and practice over the last years. Companies aim at...

    Matthias Hummer, Michael Kunz, Michael Netter, Ludwig Fuchs and Günther Pernul

    EURASIP Journal on Information Security 2016 2016:19

    Published on: 15 August 2016

  17. Research

    The role and security of firewalls in cyber-physical cloud computing

    Clouds are here to stay, and the same holds for cyber-physical systems—not to forget their combination. In light of these changing paradigms, it is of utter importance to reconsider security as both introduce ...

    Johanna Ullrich, Jordan Cropper, Peter Frühwirt and Edgar Weippl

    EURASIP Journal on Information Security 2016 2016:18

    Published on: 12 August 2016

  18. Research

    A flexible framework for mobile device forensics based on cold boot attacks

    Mobile devices, like tablets and smartphones, are common place in everyday life. Thus, the degree of security these devices can provide against digital forensics is of particular interest. A common method to a...

    Manuel Huber, Benjamin Taubmann, Sascha Wessel, Hans P. Reiser and Georg Sigl

    EURASIP Journal on Information Security 2016 2016:17

    Published on: 11 August 2016

  19. Research

    DB-SECaaS: a cloud-based protection system for document-oriented NoSQL databases

    The trend of cloud databases is leaning towards Not Only SQL (NoSQL) databases as they provide better support for scalable storage and quick retrieval of exponentially voluminous data. One of the more prominen...

    Yumna Ghazi, Rahat Masood, Abid Rauf, Muhammad Awais Shibli and Osman Hassan

    EURASIP Journal on Information Security 2016 2016:16

    Published on: 3 August 2016

  20. Research

    Experimental comparison of simulation tools for efficient cloud and mobile cloud computing applications

    Cloud computing provides a convenient and on-demand access to virtually unlimited computing resources. Mobile cloud computing (MCC) is an emerging technology that integrates cloud computing technology with mob...

    Khadijah Bahwaireth, Lo’ai Tawalbeh, Elhadj Benkhelifa, Yaser Jararweh and Mohammad A. Tawalbeh

    EURASIP Journal on Information Security 2016 2016:15

    Published on: 29 June 2016

Previous Page Page 1 of 6 Next Page