default search action
EURASIP Journal on Information Security, Volume 2017
Volume 2017, 2017
- Feng Jiang, Brian King:
A novel quality assessment for visual secret sharing schemes. 1 - Jake Drew, Michael Hahsler, Tyler Moore:
Polymorphic malware detection using sequence classification methods and ensembles. 2
- Thijs Veugen, Jeroen Doumen, Zekeriya Erkin, Gaetano Pellegrino, Sicco Verwer, Jos H. Weber:
Improved privacy of dynamic group services. 3 - Pavol Sokol, Jakub Mísek, Martin Husák:
Honeypots and honeynets: issues of privacy. 4 - Lazaros K. Gallos, Maciej Korczynski, Nina H. Fefferman:
Anomaly detection through information sharing under different topologies. 5
- Fabian Knirsch, Günther Eibl, Dominik Engel:
Multi-resolution privacy-enhancing technologies for smart metering. 6 - James Brown, Mohd Anwar, Gerry V. Dozier:
An artificial immunity approach to malware detection in a mobile platform. 7
- Jose Rubio-Hernan, Luca De Cicco, Joaquín García:
On the use of watermark-based schemes to detect cyber-physical attacks. 8 - Monther Aldwairi, Ansam M. Abu-Dalo, Moath H. A. Jarrah:
Pattern matching of signature-based IDS using Myers algorithm under MapReduce framework. 9 - Xiaolong Bai, Jie Yin, Yu-Ping Wang:
Sensor Guardian: prevent privacy inference on Android sensors. 10
- Christos Iliou, George Kalpakis, Theodora Tsikrika, Stefanos Vrochidis, Ioannis Kompatsiaris:
Hybrid focused crawling on the Surface and the Dark Web. 11 - Alexander Motzek, Gustavo Gonzalez Granadillo, Hervé Debar, Joaquín García, Ralf Möller:
Selection of Pareto-efficient response plans based on financial and operational assessments. 12 - Arnaud Oglaza, Romain Laborde, Pascale Zaraté, Abdelmalek Benzekri, François Barrère:
A new approach for managing Android permissions: learning users' preferences. 13 - Florian Dold, Christian Grothoff:
Byzantine set-union consensus using efficient set reconciliation. 14
- Dasara Shullani, Marco Fontani, Massimo Iuliani, Omar Al Shaya, Alessandro Piva:
VISION: a video and image dataset for source identification. 15
- Zhen Guo, Yu Fu, Chunjie Cao:
Secure first-price sealed-bid auction scheme. 16
- DeShu Lin, Ding Feng:
Research on transmission of technology of downward information security for wellbore trajectory control. 17 - Guang Yang, Shuofeng Yu, Shouwen Wen:
Research on fault diagnosis system of hall for workshop of meta-synthetic engineering based on information fusion. 18
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.