Skip to main content

Advertisement

Featured Article: A deep learning framework for predicting cyber attacks rates

In this paper, Xing Fang et al develops a deep learning framework by utilizing the bi-directional recurrent neural networks with long short-term memory, dubbed BRNN-LSTM.

cyber security

Articles

Most accessed articles RSS

View all articles

Special issues

Emerging Technolgies for Cybersecurity
Edited by: Wojciech Mazurczyk, Maciej Korczyński, Krzysztof Szczypiorski and Artur Janicki


Advanced in Biometrics 2015
Edited by: Andreas Uhl, Christoph Busch, Christian Rathgeb and Arslan Brömme


Security Trends in Mobile Cloud Computing, Web and Social Networking
Edited by: Pethuru Raj Chelliah, B. B. Gupta and Shingo Yamaguchi


ARES 2015 / Cyber-Physical Systems
Edited by: Edgar Weippl


View all special issues

Open special issues

Security in Embedded Systems
Deadline for submission: 16 September 2019

Biometric Authentication on Mobile Devices
Deadline for submissions: 26 July 2019

Dependable Deep Learning for Security-Oriented Applications
Deadline for submissions: 31 August 2019

Recent Advances in Software Security
Deadline for submission: 1 April 2019

Machine learning Based Visual Analytics for Multimedia Security
Deadline for submission: 10 August 2019


Call for Special Issues

EURASIP Journal on Information Security (JINS) welcomes Special Issues on timely topics related to the field of signal processing. The objective of Special Issues is to bring together recent and high quality works in a research domain, to promote key advances in information security, with a particular emphasis on the use of signal processing tools in adversarial environments and to provide overviews of the state-of-the-art in emerging domains.

Read more here

Aims and scope

The overall goal of the EURASIP Journal on Information Security, sponsored by the European Association for Signal Processing (EURASIP), is to bring together researchers and practitioners dealing with the general field of information security, with a particular emphasis on the use of signal processing tools in adversarial environments. As such, it addresses all works whereby security is achieved through a combination of techniques from cryptography, computer security, machine learning and multimedia signal processing. Application domains lie, for example, in secure storage, retrieval and tracking of multimedia data, secure outsourcing of computations, forgery detection of multimedia data, or secure use of biometrics. The journal also welcomes survey papers that give the reader a gentle introduction to one of the topics covered as well as papers that report large-scale experimental evaluations of existing techniques. Pure cryptographic papers are outside the scope of the journal.

Advertisement

Latest Tweets

Who reads the journal?

Learn more about the impact the EURASIP Journal on Information Security has worldwide

Annual Journal Metrics

Funding your APC

​​​​​​​Open access funding and policy support by SpringerOpen​​

​​​​We offer a free open access support service to make it easier for you to discover and apply for article-processing charge (APC) funding. Learn more here


Advertisement