EURASIP Journal on Information Security, Vol. 2025
Essays
1. ASTDT: an Interpretable Adaptive Spectro-Temporal Diffusion Transformer for audio deepfake detection. --Taiba Maijd Wani, Syed Asif Ahmad Qadri, Arselan Ashraf and Irene Amerini
2. An IoT system for access control using blockchain and message queuing system. --Nilima Karankar and Anita Seth
3. A fast method for finding separable Goppa polynomials used in post-quantum McEliece-based cryptography. --Mariano Lopez-Garcia and Enrique Canto-Navarro
4. Adaptive network anomaly detection using machine learning approaches. --Vasudeva Pai, Karthik Pai, Manjunatha S., Srujan Hirmeti and Vaibhav V. Bhat
5. Deep learning-based intrusion detection for IoT networks: a scalable and efficient approach. --Md. Alamgir Hossain
6. NDCA: a neighboring block differences-based cost assignment method for robust video steganography on social networks. --Jie Gan, Hong Zhang, Xinrui Xie and Yun Cao
7. Time-Sensitive Networking Digital Twin for STRIDE-based security testing. --Andrea Melis, Andrea Giovine and Lorenzo Rinieri
8. Semi-supervised method for anomaly detection in HTTP traffic. --Malki Ishara Wasundara, Junwei Zhou, Yanchao Yang, Dongdong Zhao and Jianwen Xiang
9. SEAP: squeeze-and-excitation attention guided pruning for lightweight steganalysis networks. --Qiushi Li, Shenghai Luo, Shunquan Tan and Zhenjun Li
10. Explainability-driven adversarial robustness assessment for generalized deepfake detectors. --Lorenzo Cirillo, Andrea Gervasio and Irene Amerini
11. Intelligent intrusion detection system based on crowd search optimization for attack classification in network security. --Chetan Gupta, Amit Kumar and Neelesh Kumar Jain
12. Integrating user demographic parameters for mouse behavioral biometric-based assessment fraud detection in online education platforms. --Aditya Subash, Insu Song, Ickjai Lee and Kyungmi Lee
13. Deep multi-biometric fuzzy commitment scheme: fusion methods and performance. --Valentina Fohr and Christian Rathgeb
14. A novel lightweight hybrid cryptographic framework for secure smart card operations. --Kranthi Kumar Singamaneni
15. Differential privacy and artificial intelligence: potentials, challenges, and future avenues. --Yehia Ibrahim Alzoubi and Alok Mishra
1. ASTDT: an Interpretable Adaptive Spectro-Temporal Diffusion Transformer for audio deepfake detection. --Taiba Maijd Wani, Syed Asif Ahmad Qadri, Arselan Ashraf and Irene Amerini
2. An IoT system for access control using blockchain and message queuing system. --Nilima Karankar and Anita Seth
3. A fast method for finding separable Goppa polynomials used in post-quantum McEliece-based cryptography. --Mariano Lopez-Garcia and Enrique Canto-Navarro
4. Adaptive network anomaly detection using machine learning approaches. --Vasudeva Pai, Karthik Pai, Manjunatha S., Srujan Hirmeti and Vaibhav V. Bhat
5. Deep learning-based intrusion detection for IoT networks: a scalable and efficient approach. --Md. Alamgir Hossain
6. NDCA: a neighboring block differences-based cost assignment method for robust video steganography on social networks. --Jie Gan, Hong Zhang, Xinrui Xie and Yun Cao
7. Time-Sensitive Networking Digital Twin for STRIDE-based security testing. --Andrea Melis, Andrea Giovine and Lorenzo Rinieri
8. Semi-supervised method for anomaly detection in HTTP traffic. --Malki Ishara Wasundara, Junwei Zhou, Yanchao Yang, Dongdong Zhao and Jianwen Xiang
9. SEAP: squeeze-and-excitation attention guided pruning for lightweight steganalysis networks. --Qiushi Li, Shenghai Luo, Shunquan Tan and Zhenjun Li
10. Explainability-driven adversarial robustness assessment for generalized deepfake detectors. --Lorenzo Cirillo, Andrea Gervasio and Irene Amerini
11. Intelligent intrusion detection system based on crowd search optimization for attack classification in network security. --Chetan Gupta, Amit Kumar and Neelesh Kumar Jain
12. Integrating user demographic parameters for mouse behavioral biometric-based assessment fraud detection in online education platforms. --Aditya Subash, Insu Song, Ickjai Lee and Kyungmi Lee
13. Deep multi-biometric fuzzy commitment scheme: fusion methods and performance. --Valentina Fohr and Christian Rathgeb
14. A novel lightweight hybrid cryptographic framework for secure smart card operations. --Kranthi Kumar Singamaneni
15. Differential privacy and artificial intelligence: potentials, challenges, and future avenues. --Yehia Ibrahim Alzoubi and Alok Mishra
Wani, Taiba Maijd - Personal Name
Singamaneni, Kranthi Kumar - Personal Name
Fohr, Valentina - Personal Name
Subash, Aditya - Personal Name
Gupta, Chetan - Personal Name
Cirillo, Lorenzo - Personal Name
Qiushi Li - Personal Name
Wasundara, Malki Ishara - Personal Name
Melis, Andrea - Personal Name
Gan, Jie - Personal Name
Hossain, Md. Alamgir - Personal Name
Pai, Vasudeva - Personal Name
Lopez-Garcia, Mariano - Personal Name
Karankar, Nilima - Personal Name
Alzoubi, Yehia Ibrahim - Personal Name
Singamaneni, Kranthi Kumar - Personal Name
Fohr, Valentina - Personal Name
Subash, Aditya - Personal Name
Gupta, Chetan - Personal Name
Cirillo, Lorenzo - Personal Name
Qiushi Li - Personal Name
Wasundara, Malki Ishara - Personal Name
Melis, Andrea - Personal Name
Gan, Jie - Personal Name
Hossain, Md. Alamgir - Personal Name
Pai, Vasudeva - Personal Name
Lopez-Garcia, Mariano - Personal Name
Karankar, Nilima - Personal Name
Alzoubi, Yehia Ibrahim - Personal Name
Vol. 2025
2510-523X
e-Journal PTI
Inggris
Springer Nature Singapore Pte Ltd.
2025
Cambridge, United Kingdom
LOADING LIST...
LOADING LIST...