EURASIP Journal on Information Security, Volume 2023
Articles
1.) Correction: Mobile authentication of copy detection patterns. --Olga Taran, Joakim Tutt, Taras Holotyak, Roman Chaban, Slavi Bonev and Slava Voloshynovskiy
2.) User authentication and access control to blockchain-based forensic log data. --Md. Ezazul Islam, Md. Rafiqul Islam, Madhu Chetty, Suryani Lim and Mehmood Chadhar
3.) Network traffic classification model based on attention mechanism and spatiotemporal features. --Feifei Hu, Situo Zhang, Xubin Lin, Liu Wu, Niandong Liao and Yanqi Song
4.) Network intrusion detection based on multi-domain data and ensemble-bidirectional LSTM. --Xiaoning Wang, Jia Liu and Chunjiong Zhang
5.) Mobile authentication of copy detection patterns. --Olga Taran, Joakim Tutt, Taras Holotyak, Roman Chaban, Slavi Bonev and Slava Voloshynovskiy
6.) Gaussian class-conditional simplex loss for accurate, adversarially robust deep classifier training. --Arslan Ali, Andrea Migliorati, Tiziano Bianchi and Enrico Magli
7.) A multi-gateway authentication and key-agreement scheme on wireless sensor networks for IoT. --Jen-Ho Yang
8.) Image life trails based on contrast reduction models for face counter-spoofing. --Balaji Rao Katika and Kannan Karthik
1.) Correction: Mobile authentication of copy detection patterns. --Olga Taran, Joakim Tutt, Taras Holotyak, Roman Chaban, Slavi Bonev and Slava Voloshynovskiy
2.) User authentication and access control to blockchain-based forensic log data. --Md. Ezazul Islam, Md. Rafiqul Islam, Madhu Chetty, Suryani Lim and Mehmood Chadhar
3.) Network traffic classification model based on attention mechanism and spatiotemporal features. --Feifei Hu, Situo Zhang, Xubin Lin, Liu Wu, Niandong Liao and Yanqi Song
4.) Network intrusion detection based on multi-domain data and ensemble-bidirectional LSTM. --Xiaoning Wang, Jia Liu and Chunjiong Zhang
5.) Mobile authentication of copy detection patterns. --Olga Taran, Joakim Tutt, Taras Holotyak, Roman Chaban, Slavi Bonev and Slava Voloshynovskiy
6.) Gaussian class-conditional simplex loss for accurate, adversarially robust deep classifier training. --Arslan Ali, Andrea Migliorati, Tiziano Bianchi and Enrico Magli
7.) A multi-gateway authentication and key-agreement scheme on wireless sensor networks for IoT. --Jen-Ho Yang
8.) Image life trails based on contrast reduction models for face counter-spoofing. --Balaji Rao Katika and Kannan Karthik
Olga Taran - Personal Name
Md. Ezazul Islam - Personal Name
Feifei Hu - Personal Name
Xiaoning Wang - Personal Name
Arslan Ali - Personal Name
Jen-Ho Yang - Personal Name
Balaji Rao Katika - Personal Name
Md. Ezazul Islam - Personal Name
Feifei Hu - Personal Name
Xiaoning Wang - Personal Name
Arslan Ali - Personal Name
Jen-Ho Yang - Personal Name
Balaji Rao Katika - Personal Name
Volume 2023
2510-523X
e-Journal PTI
Inggris
Springer Nature Singapore Pte Ltd.
2023
Cambridge, United Kingdom
LOADING LIST...
LOADING LIST...