Articles

Sort by
Previous Page Page 1 of 6 Next Page
  1. Research

    VISION: a video and image dataset for source identification

    Forensic research community keeps proposing new techniques to analyze digital images and videos. However, the performance of proposed tools are usually tested on data that are far from reality in terms of reso...

    Dasara Shullani, Marco Fontani, Massimo Iuliani, Omar Al Shaya and Alessandro Piva

    EURASIP Journal on Information Security 2017 2017:15

    Published on: 3 October 2017

  2. Research

    Byzantine set-union consensus using efficient set reconciliation

    Applications of secure multiparty computation such as certain electronic voting or auction protocols require Byzantine agreement on large sets of elements. Implementations proposed in the literature so far hav...

    Florian Dold and Christian Grothoff

    EURASIP Journal on Information Security 2017 2017:14

    Published on: 27 July 2017

  3. Research

    A new approach for managing Android permissions: learning users’ preferences

    Today, permissions management solutions on mobile devices employ Identity Based Access Control (IBAC) models. If this approach was suitable when people had only a few games (like Snake or Tetris) installed on ...

    Arnaud Oglaza, Romain Laborde, Pascale Zaraté, Abdelmalek Benzekri and François Barrère

    EURASIP Journal on Information Security 2017 2017:13

    Published on: 12 July 2017

  4. Research

    Selection of Pareto-efficient response plans based on financial and operational assessments

    Finding adequate responses to ongoing attacks on ICT systems is a pertinacious problem and requires assessments from different perpendicular viewpoints. However, current research focuses on reducing the impact...

    Alexander Motzek, Gustavo Gonzalez-Granadillo, Hervé Debar, Joaquin Garcia-Alfaro and Ralf Möller

    EURASIP Journal on Information Security 2017 2017:12

    Published on: 10 July 2017

  5. Research

    Hybrid focused crawling on the Surface and the Dark Web

    Focused crawlers enable the automatic discovery of Web resources about a given topic by automatically navigating through the Web link structure and selecting the hyperlinks to follow by estimating their releva...

    Christos Iliou, George Kalpakis, Theodora Tsikrika, Stefanos Vrochidis and Ioannis Kompatsiaris

    EURASIP Journal on Information Security 2017 2017:11

    Published on: 4 July 2017

  6. Research

    Sensor Guardian: prevent privacy inference on Android sensors

    Privacy inference attacks based on sensor data is an emerging and severe threat on smart devices, in which malicious applications leverage data from innocuous sensors to infer sensitive information of user, e....

    Xiaolong Bai, Jie Yin and Yu-Ping Wang

    EURASIP Journal on Information Security 2017 2017:10

    Published on: 8 June 2017

  7. Research

    On the use of watermark-based schemes to detect cyber-physical attacks

    We address security issues in cyber-physical systems (CPSs). We focus on the detection of attacks against cyber-physical systems. Attacks against these systems shall be handled both in terms of safety and secu...

    Jose Rubio-Hernan, Luca De Cicco and Joaquin Garcia-Alfaro

    EURASIP Journal on Information Security 2017 2017:8

    Published on: 2 June 2017

  8. Research

    An artificial immunity approach to malware detection in a mobile platform

    Inspired by the human immune system, we explore the development of a new Multiple-Detector Set Artificial Immune System (mAIS) for the detection of mobile malware based on the information flows in Android apps...

    James Brown, Mohd Anwar and Gerry Dozier

    EURASIP Journal on Information Security 2017 2017:7

    Published on: 27 March 2017

  9. Research

    Multi-resolution privacy-enhancing technologies for smart metering

    The availability of individual load profiles per household in the smart grid end-user domain combined with non-intrusive load monitoring to infer personal data from these load curves has led to privacy concern...

    Fabian Knirsch, Günther Eibl and Dominik Engel

    EURASIP Journal on Information Security 2017 2017:6

    Published on: 20 March 2017

  10. Research

    Honeypots and honeynets: issues of privacy

    Honeypots and honeynets are popular tools in the area of network security and network forensics. The deployment and usage of these tools are influenced by a number of technical and legal issues, which need to ...

    Pavol Sokol, Jakub Míšek and Martin Husák

    EURASIP Journal on Information Security 2017 2017:4

    Published on: 28 February 2017

  11. Research

    Anomaly detection through information sharing under different topologies

    Early detection of traffic anomalies in networks increases the probability of effective intervention/mitigation actions, thereby improving the stability of system function. Centralized methods of anomaly detec...

    Lazaros K. Gallos, Maciej Korczyński and Nina H. Fefferman

    EURASIP Journal on Information Security 2017 2017:5

    Published on: 28 February 2017

  12. Research

    Improved privacy of dynamic group services

    We consider dynamic group services, where outputs based on small samples of privacy-sensitive user inputs are repetitively computed. The leakage of user input data is analysed, caused by producing multiple out...

    Thijs Veugen, Jeroen Doumen, Zekeriya Erkin, Gaetano Pellegrino, Sicco Verwer and Jos Weber

    EURASIP Journal on Information Security 2017 2017:3

    Published on: 1 February 2017

  13. Research

    A novel quality assessment for visual secret sharing schemes

    To evaluate the visual quality in visual secret sharing schemes, most of the existing metrics fail to generate fair and uniform quality scores for tested reconstructed images. We propose a new approach to measure...

    Feng Jiang and Brian King

    EURASIP Journal on Information Security 2017 2017:1

    Published on: 19 January 2017

  14. Research

    Fuzzing binaries with Lévy flight swarms

    We present a new method for random testing of binary executables inspired by biology. In our approach, we introduce the first fuzzer based on a mathematical model for optimal foraging. To minimize search time ...

    Konstantin Böttinger

    EURASIP Journal on Information Security 2016 2016:28

    Published on: 21 November 2016

  15. Research

    Unlinkable improved multi-biometric iris fuzzy vault

    Iris recognition technologies are deployed in numerous large-scale nation-wide projects in order to provide robust and reliable biometric recognition of individuals. Moreover, the iris has been found to be rat...

    Christian Rathgeb, Benjamin Tams, Johannes Wagner and Christoph Busch

    EURASIP Journal on Information Security 2016 2016:26

    Published on: 2 November 2016

  16. Research

    Identification performance of evidential value estimation for ridge-based biometrics

    Law enforcement agencies around the world use ridge-based biometrics, especially fingerprints, to fight crime. Fingermarks that are left at a crime scene and identified as potentially having evidential value (...

    Johannes Kotzerke, Hao Hao, Stephen A. Davis, Robert Hayes, L. J. Spreeuwers, R. N. J. Veldhuis and K. J. Horadam

    EURASIP Journal on Information Security 2016 2016:24

    Published on: 26 October 2016

  17. Research

    Quality-based iris segmentation-level fusion

    Iris localisation and segmentation are challenging and critical tasks in iris biometric recognition. Especially in non-cooperative and less ideal environments, their impact on overall system performance has be...

    Peter Wild, Heinz Hofbauer, James Ferryman and Andreas Uhl

    EURASIP Journal on Information Security 2016 2016:25

    Published on: 26 October 2016

  18. Research

    Hidost: a static machine-learning-based detector of malicious files

    Malicious software, i.e., malware, has been a persistent threat in the information security landscape since the early days of personal computing. The recent targeted attacks extensively use non-executable malw...

    Nedim Šrndić and Pavel Laskov

    EURASIP Journal on Information Security 2016 2016:22

    Published on: 26 September 2016

  19. Research

    Privacy-preserving load profile matching for tariff decisions in smart grids

    In liberalized energy markets, matching consumption patterns to energy tariffs is desirable, but practically limited due to privacy concerns, both on the side of the consumer and on the side of the utilities. ...

    Andreas Unterweger, Fabian Knirsch, Günther Eibl and Dominik Engel

    EURASIP Journal on Information Security 2016 2016:21

    Published on: 26 September 2016

  20. Research

    DST approach to enhance audio quality on lost audio packet steganography

    Lost audio packet steganography (LACK) is a steganography technique established on the VoIP network. LACK provides a high-capacity covert channel over VoIP network by artificially delaying and dropping a numbe...

    Qilin Qi, Dongming Peng and Hamid Sharif

    EURASIP Journal on Information Security 2016 2016:20

    Published on: 23 September 2016

  21. Research

    Adaptive identity and access management—contextual data based policies

    Due to compliance and IT security requirements, company-wide identity and access management within organizations has gained significant importance in research and practice over the last years. Companies aim at...

    Matthias Hummer, Michael Kunz, Michael Netter, Ludwig Fuchs and Günther Pernul

    EURASIP Journal on Information Security 2016 2016:19

    Published on: 15 August 2016

Previous Page Page 1 of 6 Next Page

Funding your APC

​​​​​​​Open access funding and policy support by SpringerOpen​​

​​​​We offer a free open access support service to make it easier for you to discover and apply for article-processing charge (APC) funding. Learn more here