Skip to main content

Advertisement

Featured Article: A deep learning framework for predicting cyber attacks rates

In this paper, Xing Fang et al develops a deep learning framework by utilizing the bi-directional recurrent neural networks with long short-term memory, dubbed BRNN-LSTM.

cyber security

Articles

Special issues

Emerging Technolgies for Cybersecurity
Edited by: Wojciech Mazurczyk, Maciej Korczyński, Krzysztof Szczypiorski and Artur Janicki


Advanced in Biometrics 2015
Edited by: Andreas Uhl, Christoph Busch, Christian Rathgeb and Arslan Brömme


Security Trends in Mobile Cloud Computing, Web and Social Networking
Edited by: Pethuru Raj Chelliah, B. B. Gupta and Shingo Yamaguchi


ARES 2015 / Cyber-Physical Systems
Edited by: Edgar Weippl


View all special issues

Open special issues

Security in Embedded Systems
Deadline for submission: 15 January 2020

Facing emerging challenges in multimedia forensics
Deadline for submission: 30 April 2020


Call for Special Issues

EURASIP Journal on Information Security (JINS) welcomes Special Issues on timely topics related to the field of signal processing. The objective of Special Issues is to bring together recent and high quality works in a research domain, to promote key advances in information security, with a particular emphasis on the use of signal processing tools in adversarial environments and to provide overviews of the state-of-the-art in emerging domains.

Read more here

Aims and scope

The overall goal of the EURASIP Journal on Information Security, sponsored by the European Association for Signal Processing (EURASIP), is to bring together researchers and practitioners dealing with the general field of information security, with a particular emphasis on the use of signal processing tools in adversarial environments. As such, it addresses all works whereby security is achieved through a combination of techniques from cryptography, computer security, machine learning and multimedia signal processing. Application domains lie, for example, in secure storage, retrieval and tracking of multimedia data, secure outsourcing of computations, forgery detection of multimedia data, or secure use of biometrics. The journal also welcomes survey papers that give the reader a gentle introduction to one of the topics covered as well as papers that report large-scale experimental evaluations of existing techniques. Pure cryptographic papers are outside the scope of the journal.

Advertisement

Latest Tweets

Who reads the journal?

Learn more about the impact the EURASIP Journal on Information Security has worldwide

Annual Journal Metrics

Funding your APC

​​​​​​​Open access funding and policy support by SpringerOpen​​

​​​​We offer a free open access support service to make it easier for you to discover and apply for article-processing charge (APC) funding. Learn more here


Advertisement