Retraction Note: Network security threat detection technology based on EPSO-BP algorithm
This article has been retracted. Please see the Retraction Notice for more detail: https://doi.org/10.1186/s13635-024-00152-9
Page 1 of 5
This article has been retracted. Please see the Retraction Notice for more detail: https://doi.org/10.1186/s13635-024-00152-9
Machine learning has become prevalent in transforming diverse aspects of our daily lives through intelligent digital solutions. Advanced disease diagnosis, autonomous vehicular systems, and automated threat de...
The research addresses energy consumption, latency, and network reliability challenges in wireless sensor network communication, especially in military security applications. A multi-agent context-aware model ...
Over the last 20 years, Wi-Fi technology has advanced to the point where most modern devices are small and rely on Wi-Fi to access the internet. Wi-Fi network security is severely questioned since there is no ...
Recently, biometric recognition has become a significant field of research. The concept of cancelable biometrics (CB) has been introduced to address security concerns related to the handling of sensitive data....
With the development of Internet technology, the large number of network nodes and dynamic structure makes network security detection more complex, which requires the use of a multi-layer feedforward neural ne...
With the rapid development of the Internet of Things and intelligent technology, the application of Radio Frequency Identification (RFID) technology in training room management is becoming increasingly widespr...
In recent years, various smart devices based on IoT technology, such as smart homes, healthcare, detection, and logistics systems, have emerged. However, as the number of IoT-connected devices increases, secur...
The development of big data has epromoted the development of Internet technology, but it has brought more network security and privacy problems. Therefore, how to solve network security problems is the main re...
Extensive research has been conducted to enhance the availability of IoT devices and data by focusing on the rapid prediction of instantaneous fault rates and temperatures. Temperature plays a crucial role in ...
Personalized medical data privacy and secure storage protection face serious challenges, especially in terms of data security and storage efficiency. Traditional encryption and storage solutions cannot meet th...
Wireless sensor networks, as an emerging information exchange technology, have been widely applied in many fields. However, nodes tend to become damaged in harsh and complex environmental conditions. In order ...
Because the JPEG recompression in social networks changes the DCT coefficients of uploaded images, applying image steganography in popular image-sharing social networks requires robustness. Currently, most rob...
With the growth of the Internet, network security issues have become increasingly complex, and the importance of node interaction security is also gradually becoming prominent. At present, research on network ...
Currently, sensor energy assembly in wireless sensor networks is limited, and clustering methods are not effective to improve sensor energy consumption rate. Thus, a hierarchical energy-saving routing algorith...
For dispute resolution in daily life, tamper-proof data storage and retrieval of log data are important with the incorporation of trustworthy access control for the related users and devices, while giving acce...
Traffic classification is widely used in network security and network management. Early studies have mainly focused on mapping network traffic to different unencrypted applications, but little research has bee...
Different types of network traffic can be treated as data originating from different domains with the same objectives of problem-solving. Previous work utilizing multi-domain machine learning has primarily ass...
In the recent years, the copy detection patterns (CDP) attracted a lot of attention as a link between the physical and digital worlds, which is of great interest for the internet of things and brand protection...
In this work, we present the Gaussian Class-Conditional Simplex (GCCS) loss: a novel approach for training deep robust multiclass classifiers that improves over the state-of-the-art in terms of classification ...
The Internet of Things (IoT) is designed to let anything connect to the Internet, and the things can be people, computers, and things. On the IoT, the Wireless Sensor Network (WSN) plays an important role beca...
Natural face images are both content and context-rich, in the sense that they carry significant immersive information via depth cues embedded in the form of self-shadows or a space varying blur. Images of plan...
Visual cryptography (VC) is a powerful technique with high security and requires no PC or device to reconstruct the secret information. Progressive visual cryptography (PVC) is a variation of the VC scheme in ...
CAPTCHA (Completely Automated Public Turing test to tell Computers and Humans Apart) has long been used to keep automated bots from misusing web services by leveraging human-artificial intelligence (HAI) interact...
This paper reports the findings from an empirical study investigating the effectiveness of using intelligent voice assistants, Amazon Alexa in our case, to deliver a phishing training to users. Because intelli...
Reliable and non-intrusive user identification and authentication on mobile devices, such as smartphones, are topical tasks today. The majority of state-of-the-art solutions in this domain are based on “device...
Presentation attack detection (PAD) is used to mitigate the dangers of the weakest link problem in biometric recognition, in which failure modes of one application affect the security of all other applications. S...
Most social media channels are lossy where videos are transcoded to reduce transmission bandwidth or storage space, such as social networking sites and video sharing platforms. Video transcoding makes most vid...
Among the most major potential attacks against fingerprint authentication systems are those that target the stored reference templates. These threats are extremely damaging as they can lead to the invasion of ...
Source device identification is an important topic in image forensics since it allows to trace back the origin of an image. Its forensics counterpart is source device anonymization, that is, to mask any trace ...
Deep neural networks (DNNs) are widely used to handle many difficult tasks, such as image classification and malware detection, and achieve outstanding performance. However, recent studies on adversarial examp...
Machine learning algorithms, however effective, are known to be vulnerable in adversarial scenarios where a malicious user may inject manipulated instances. In this work, we focus on evasion attacks, where a m...
Illicit cryptocurrency mining has become one of the prevalent methods for monetization of computer security incidents. In this attack, victims’ computing resources are abused to mine cryptocurrency for the ben...
Recently, adversarial attacks have drawn the community’s attention as an effective tool to degrade the accuracy of neural networks. However, their actual usage in the world is limited. The main reason is that ...
Information fusion, i.e., the combination of expert systems, has a huge potential to improve the accuracy of pattern recognition systems. During the last decades, various application fields started to use diff...
The JPEG compression algorithm has proven to be efficient in saving storage and preserving image quality thus becoming extremely popular. On the other hand, the overall process leaves traces into encoded signa...
Education acts as a soul in the overall societal development, in one way or the other. Aspirants, who gain their degrees genuinely, will help society with their knowledge and skills. But, on the other side of ...
Camera fingerprints based on sensor PhotoResponse Non-Uniformity (PRNU) have gained broad popularity in forensic applications due to their ability to univocally identify the camera that captured a certain imag...
Estimating the primary quantization matrix of double JPEG compressed images is a problem of relevant importance in image forensics since it allows to infer important information about the past history of an im...
The dependability of visual information on the web and the authenticity of digital media appearing virally in social media platforms has been raising unprecedented concerns. As a result, in the last years the ...
In order to further improve the accuracy and efficiency of network information security situation prediction, this study used the dynamic equal-dimensional method based on gray correlation analysis to improve ...
Several methods for synthetic audio speech generation have been developed in the literature through the years. With the great technological advances brought by deep learning, many novel synthetic speech techni...
SHDM stands for Sphere-Hardening Dither Modulation and is a watermarking algorithm based on quantizing the norm of a vector extracted from the cover work. We show how SHDM can be integrated into a fully commut...
This paper investigates the visual quality of the adversarial examples. Recent papers propose to smooth the perturbations to get rid of high frequency artifacts. In this work, smoothing has a different meaning...
Structured Query Language (SQL) injection and cross-site scripting remain a major threat to data-driven web applications. Instances where hackers obtain unrestricted access to back-end database of web applicat...
The rapid development of IoT technology has led to the usage of various devices in our daily life. Along with the ever-increasing rise of the Internet of Things, the use of appropriate methods for establishing...
Backdoor attacks against supervised machine learning methods seek to modify the training samples in such a way that, at inference time, the presence of a specific pattern (trigger) in the input data causes mis...
Pattern substitution (PS) method (Ho et al., Comput. Stand. Interfaces 31:787–794, 2009) is a recent reversible data hiding method for binary images. It generates one pattern pair, the patterns in which are ca...
In recent years, classification techniques based on deep neural networks (DNN) were widely used in many fields such as computer vision, natural language processing, and self-driving cars. However, the vulnerab...
Learn more about the impact the EURASIP Journal on Information Security has worldwide
2022 Citation Impact
3.6 - 2-year Impact Factor
3.6 - 5-year Impact Factor
1.461 - SNIP (Source Normalized Impact per Paper)
0.901 - SJR (SCImago Journal Rank)
2023 Speed
39 days submission to first editorial decision for all manuscripts (Median)
141 days submission to accept (Median)
2023 Usage
289,389 downloads