Skip to main content

Advertisement

Articles

Page 1 of 4

  1. Genomic data is crucial in the understanding of many diseases and for the guidance of medical treatments. Pharmacogenomics and cancer genomics are just two areas in precision medicine of rapidly growing utiliz...

    Authors: Johannes Buchmann, Matthias Geihs, Kay Hamacher, Stefan Katzenbeisser and Sebastian Stammler

    Citation: EURASIP Journal on Information Security 2019 2019:16

    Content type: Research

    Published on:

  2. Recent advances in intrusion detection systems based on machine learning have indeed outperformed other techniques, but struggle with detecting multiple classes of attacks with high accuracy. We propose a meth...

    Authors: Jivitesh Sharma, Charul Giri, Ole-Christoffer Granmo and Morten Goodwin

    Citation: EURASIP Journal on Information Security 2019 2019:15

    Content type: Research

    Published on:

  3. Many applications are built upon private algorithms, and executing them in untrusted, remote environments poses confidentiality issues. To some extent, these problems can be addressed by ensuring the use of se...

    Authors: Kubilay Ahmet Küçük, David Grawrock and Andrew Martin

    Citation: EURASIP Journal on Information Security 2019 2019:14

    Content type: Research

    Published on:

  4. The Internet of Things (IoT) is a new technology rapidly developed in various fields in recent years. With the continuous application of the IoT technology in production and life, the network security problem ...

    Authors: Wenjun Yang, Jiaying Zhang, Chundong Wang and Xiuliang Mo

    Citation: EURASIP Journal on Information Security 2019 2019:13

    Content type: Research

    Published on:

  5. Mobile ads are plagued with fraudulent clicks which is a major challenge for the advertising community. Although popular ad networks use many techniques to detect click fraud, they do not protect the client fr...

    Authors: Riwa Mouawi, Imad H. Elhajj, Ali Chehab and Ayman Kayssi

    Citation: EURASIP Journal on Information Security 2019 2019:11

    Content type: Research

    Published on:

  6. The current online digital world, consisting of thousands of newspapers, blogs, social media, and cloud file sharing services, is providing easy and unlimited access to a large treasure of text contents. Makin...

    Authors: Stefano Giovanni Rizzo, Flavio Bertini and Danilo Montesi

    Citation: EURASIP Journal on Information Security 2019 2019:10

    Content type: Research

    Published on:

  7. Secure coding is crucial for the design of secure and efficient software and computing systems. However, many programmers avoid secure coding practices for a variety of reasons. Some of these reasons are lack ...

    Authors: Fitzroy D. Nembhard, Marco M. Carvalho and Thomas C. Eskridge

    Citation: EURASIP Journal on Information Security 2019 2019:9

    Content type: Research

    Published on:

  8. This paper first gives a regularity theorem and its corollary. Then, a new construction of generating hard random lattices with short bases is obtained by using this corollary. This construction is from a new ...

    Authors: Chengli Zhang, Wenping Ma, Hefeng Chen and Feifei Zhao

    Citation: EURASIP Journal on Information Security 2019 2019:8

    Content type: Research

    Published on:

  9. A new approach is proposed to quantitatively evaluate the binary detection performance of the biometric personal recognition systems. The importance of correlation between the overall detection performance and...

    Authors: Pallavi D. Deshpande, Prachi Mukherji and Anil S. Tavildar

    Citation: EURASIP Journal on Information Security 2019 2019:6

    Content type: Research

    Published on:

  10. Like how useful weather forecasting is, the capability of forecasting or predicting cyber threats can never be overestimated. Previous investigations show that cyber attack data exhibits interesting phenomena,...

    Authors: Xing Fang, Maochao Xu, Shouhuai Xu and Peng Zhao

    Citation: EURASIP Journal on Information Security 2019 2019:5

    Content type: Research

    Published on:

  11. This paper investigates the impact of code coverage on machine learning-based dynamic analysis of Android malware. In order to maximize the code coverage, dynamic analysis on Android typically requires the gen...

    Authors: Suleiman Y. Yerima, Mohammed K. Alzaylaee and Sakir Sezer

    Citation: EURASIP Journal on Information Security 2019 2019:4

    Content type: Research

    Published on:

  12. With rapid development of the Internet, images are spreading more and more quickly and widely. The phenomenon of image illegal usage emerges frequently, and this has marked impacts on people’s normal life. The...

    Authors: Yahong Hu, Xia Sheng, Jiafa Mao, Kaihui Wang and Danhong Zhong

    Citation: EURASIP Journal on Information Security 2019 2019:3

    Content type: Research

    Published on:

  13. Blockchains are proposed for many application domains apart from financial transactions. While there are generic blockchains that can be molded for specific use cases, they often lack a lightweight and easy-to...

    Authors: Fabian Knirsch, Andreas Unterweger and Dominik Engel

    Citation: EURASIP Journal on Information Security 2019 2019:2

    Content type: Research

    Published on:

  14. Network attacks are serious concerns in today’s increasingly interconnected society. Recent studies have applied conventional machine learning to network attack detection by learning the patterns of the networ...

    Authors: Juan Zhao, Sachin Shetty, Jan Wei Pan, Charles Kamhoua and Kevin Kwiat

    Citation: EURASIP Journal on Information Security 2019 2019:1

    Content type: Research

    Published on:

  15. Recent years have seen the emergence of wearable medical systems (WMS) that have demonstrated great promise for improved health monitoring and overall well-being. Ensuring that these WMS accurately monitor a u...

    Authors: Hang Cai and Krishna K. Venkatasubramanian

    Citation: EURASIP Journal on Information Security 2018 2018:13

    Content type: Research

    Published on:

  16. Data owners’ outsourced data on cloud data storage servers by the deduplication technique can reduce not only their own storage cost but also cloud’s. This paradigm also introduces new security issues such as ...

    Authors: Guangwei Xu, Miaolin Lai, Jing Li, Li Sun and Xiujin Shi

    Citation: EURASIP Journal on Information Security 2018 2018:12

    Content type: Research

    Published on:

  17. Distributed denial of service (DDoS) flooding attacks are one of the main methods to destroy the availability of critical online services today. These DDoS attacks cannot be prevented ahead of time, and once i...

    Authors: Sufian Hameed and Usman Ali

    Citation: EURASIP Journal on Information Security 2018 2018:11

    Content type: Research

    Published on:

  18. The fifth generation (5G) of cellular networks will bring 10 Gb/s user speeds, 1000-fold increase in system capacity, and 100 times higher connection density. In response to these requirements, the 5G networks...

    Authors: Filipo Sharevski

    Citation: EURASIP Journal on Information Security 2018 2018:8

    Content type: Review

    Published on:

  19. Current attacks are complex and stealthy. The recent WannaCry malware campaign demonstrates that this is true not only for targeted operations, but also for massive attacks. Complex attacks can only be describ...

    Authors: Julio Navarro, Véronique Legrand, Aline Deruyver and Pierre Parrend

    Citation: EURASIP Journal on Information Security 2018 2018:6

    Content type: Research

    Published on:

  20. Transaction traces analysis is a key utility for marketing, trend monitoring, and fraud detection purposes. However, they can also be used for designing and verification of contextual risk management systems f...

    Authors: Albert Sitek and Zbigniew Kotulski

    Citation: EURASIP Journal on Information Security 2018 2018:5

    Content type: Research

    Published on:

  21. Behind firewalls, more and more cybersecurity attacks are specifically targeted to the very network where they are taking place. This review proposes a comprehensive framework for addressing the challenge of c...

    Authors: Pierre Parrend, Julio Navarro, Fabio Guigou, Aline Deruyver and Pierre Collet

    Citation: EURASIP Journal on Information Security 2018 2018:4

    Content type: Review

    Published on:

  22. In this work, side-channel attacks (SCAs) are considered as a security metric for the implementation of hybrid cryptosystems utilizing the neural network-based Tree Parity Re-Keying Machines (TPM). A virtual s...

    Authors: Jonathan Martínez Padilla, Uwe Meyer-Baese and Simon Foo

    Citation: EURASIP Journal on Information Security 2018 2018:3

    Content type: Research

    Published on:

  23. Although 5G (fifth generation) networks are still in the realm of ideas, their architecture can be considered as reaching a forming phase. There are several reports and white papers which attempt to precise 5G...

    Authors: Zbigniew Kotulski, Tomasz Wojciech Nowak, Mariusz Sepczuk, Marcin Tunia, Rafal Artych, Krzysztof Bocianiak, Tomasz Osko and Jean-Philippe Wary

    Citation: EURASIP Journal on Information Security 2018 2018:2

    Content type: Research

    Published on:

  24. By analyzing multi-sensor information fusion system and hall for workshop of meta-synthetic engineering (HWME) essentially, a universal information fusion system of HWME based on multi-sensor is put forward. A...

    Authors: Guang Yang, Shuofeng Yu and Shouwen Wen

    Citation: EURASIP Journal on Information Security 2017 2017:18

    Content type: Research

    Published on:

  25. In modern times, people have paid more attention to their private information. The data confidentiality is very important in many economic aspects. In this paper, we proposed a secure auction system, in which ...

    Authors: Zhen Guo, Yu Fu and Chunjie Cao

    Citation: EURASIP Journal on Information Security 2017 2017:16

    Content type: Research

    Published on:

  26. Forensic research community keeps proposing new techniques to analyze digital images and videos. However, the performance of proposed tools are usually tested on data that are far from reality in terms of reso...

    Authors: Dasara Shullani, Marco Fontani, Massimo Iuliani, Omar Al Shaya and Alessandro Piva

    Citation: EURASIP Journal on Information Security 2017 2017:15

    Content type: Research

    Published on:

  27. Applications of secure multiparty computation such as certain electronic voting or auction protocols require Byzantine agreement on large sets of elements. Implementations proposed in the literature so far hav...

    Authors: Florian Dold and Christian Grothoff

    Citation: EURASIP Journal on Information Security 2017 2017:14

    Content type: Research

    Published on:

  28. Today, permissions management solutions on mobile devices employ Identity Based Access Control (IBAC) models. If this approach was suitable when people had only a few games (like Snake or Tetris) installed on ...

    Authors: Arnaud Oglaza, Romain Laborde, Pascale Zaraté, Abdelmalek Benzekri and François Barrère

    Citation: EURASIP Journal on Information Security 2017 2017:13

    Content type: Research

    Published on:

  29. Finding adequate responses to ongoing attacks on ICT systems is a pertinacious problem and requires assessments from different perpendicular viewpoints. However, current research focuses on reducing the impact...

    Authors: Alexander Motzek, Gustavo Gonzalez-Granadillo, Hervé Debar, Joaquin Garcia-Alfaro and Ralf Möller

    Citation: EURASIP Journal on Information Security 2017 2017:12

    Content type: Research

    Published on:

  30. Focused crawlers enable the automatic discovery of Web resources about a given topic by automatically navigating through the Web link structure and selecting the hyperlinks to follow by estimating their releva...

    Authors: Christos Iliou, George Kalpakis, Theodora Tsikrika, Stefanos Vrochidis and Ioannis Kompatsiaris

    Citation: EURASIP Journal on Information Security 2017 2017:11

    Content type: Research

    Published on:

  31. Privacy inference attacks based on sensor data is an emerging and severe threat on smart devices, in which malicious applications leverage data from innocuous sensors to infer sensitive information of user, e....

    Authors: Xiaolong Bai, Jie Yin and Yu-Ping Wang

    Citation: EURASIP Journal on Information Security 2017 2017:10

    Content type: Research

    Published on:

  32. We address security issues in cyber-physical systems (CPSs). We focus on the detection of attacks against cyber-physical systems. Attacks against these systems shall be handled both in terms of safety and secu...

    Authors: Jose Rubio-Hernan, Luca De Cicco and Joaquin Garcia-Alfaro

    Citation: EURASIP Journal on Information Security 2017 2017:8

    Content type: Research

    Published on:

  33. The availability of individual load profiles per household in the smart grid end-user domain combined with non-intrusive load monitoring to infer personal data from these load curves has led to privacy concern...

    Authors: Fabian Knirsch, Günther Eibl and Dominik Engel

    Citation: EURASIP Journal on Information Security 2017 2017:6

    Content type: Research

    Published on:

  34. Early detection of traffic anomalies in networks increases the probability of effective intervention/mitigation actions, thereby improving the stability of system function. Centralized methods of anomaly detec...

    Authors: Lazaros K. Gallos, Maciej Korczyński and Nina H. Fefferman

    Citation: EURASIP Journal on Information Security 2017 2017:5

    Content type: Research

    Published on:

  35. Honeypots and honeynets are popular tools in the area of network security and network forensics. The deployment and usage of these tools are influenced by a number of technical and legal issues, which need to ...

    Authors: Pavol Sokol, Jakub Míšek and Martin Husák

    Citation: EURASIP Journal on Information Security 2017 2017:4

    Content type: Research

    Published on:

  36. We consider dynamic group services, where outputs based on small samples of privacy-sensitive user inputs are repetitively computed. The leakage of user input data is analysed, caused by producing multiple out...

    Authors: Thijs Veugen, Jeroen Doumen, Zekeriya Erkin, Gaetano Pellegrino, Sicco Verwer and Jos Weber

    Citation: EURASIP Journal on Information Security 2017 2017:3

    Content type: Research

    Published on:

  37. To evaluate the visual quality in visual secret sharing schemes, most of the existing metrics fail to generate fair and uniform quality scores for tested reconstructed images. We propose a new approach to measure...

    Authors: Feng Jiang and Brian King

    Citation: EURASIP Journal on Information Security 2017 2017:1

    Content type: Research

    Published on:

  38. We present a new method for random testing of binary executables inspired by biology. In our approach, we introduce the first fuzzer based on a mathematical model for optimal foraging. To minimize search time ...

    Authors: Konstantin Böttinger

    Citation: EURASIP Journal on Information Security 2016 2016:28

    Content type: Research

    Published on:

  39. Iris recognition technologies are deployed in numerous large-scale nation-wide projects in order to provide robust and reliable biometric recognition of individuals. Moreover, the iris has been found to be rat...

    Authors: Christian Rathgeb, Benjamin Tams, Johannes Wagner and Christoph Busch

    Citation: EURASIP Journal on Information Security 2016 2016:26

    Content type: Research

    Published on:

Latest Tweets

Who reads the journal?

Learn more about the impact the EURASIP Journal on Information Security has worldwide

Annual Journal Metrics

Funding your APC

​​​​​​​Open access funding and policy support by SpringerOpen​​

​​​​We offer a free open access support service to make it easier for you to discover and apply for article-processing charge (APC) funding. Learn more here


Advertisement