Skip to content


Featured Article: Foundations and applications of Artificial Intelligence for zero-day and multi-step attack detection

In this paper, Pierre Parrend et al present a comprehensive framework for addressing the challenge of characterizing novel complex threats and relevant counter-measures.

cyber security


Most accessed articles RSS

View all articles

Special issues

Emerging Technolgies for Cybersecurity
Edited by: Wojciech Mazurczyk, Maciej Korczyński, Krzysztof Szczypiorski and Artur Janicki

Advanced in Biometrics 2015
Edited by: Andreas Uhl, Christoph Busch, Christian Rathgeb and Arslan Brömme

Security Trends in Mobile Cloud Computing, Web and Social Networking
Edited by: Pethuru Raj Chelliah, B. B. Gupta and Shingo Yamaguchi

ARES 2015 / Cyber-Physical Systems
Edited by: Edgar Weippl

View all special issues

Open special issues

Biometric Authentication on Mobile Devices
Deadline for submissions: 26 July 2019

Dependable Deep Learning for Security-Oriented Applications
Deadline for submissions: 15 June 2019

Recent Advances in Software Security
Deadline for submission: 1 April 2019

Call for Special Issues

EURASIP Journal on Information Security (JINS) welcomes Special Issues on timely topics related to the field of signal processing. The objective of Special Issues is to bring together recent and high quality works in a research domain, to promote key advances in information security, with a particular emphasis on the use of signal processing tools in adversarial environments and to provide overviews of the state-of-the-art in emerging domains.

Read more here

Aims and scope

The overall goal of the EURASIP Journal on Information Security, sponsored by the European Association for Signal Processing (EURASIP), is to bring together researchers and practitioners dealing with the general field of information security, with a particular emphasis on the use of signal processing tools in adversarial environments. As such, it addresses all works whereby security is achieved through a combination of techniques from cryptography, computer security, machine learning and multimedia signal processing. Application domains lie, for example, in secure storage, retrieval and tracking of multimedia data, secure outsourcing of computations, forgery detection of multimedia data, or secure use of biometrics. The journal also welcomes survey papers that give the reader a gentle introduction to one of the topics covered as well as papers that report large-scale experimental evaluations of existing techniques. Pure cryptographic papers are outside the scope of the journal.


Latest Tweets

Who reads the journal?

Learn more about the impact the EURASIP Journal on Information Security has worldwide

2018 Journal Metrics

Funding your APC

​​​​​​​Open access funding and policy support by SpringerOpen​​

​​​​We offer a free open access support service to make it easier for you to discover and apply for article-processing charge (APC) funding. Learn more here