EURASIP Journal on Information Security

短名
Journal Impact2.46
国际分区COMPUTER SCIENCE, INFORMATION SYSTEMS(Q2)
ISSN2510-523X
h-index

期刊主页
涉及主题计算机科学计算机安全操作系统人工智能数学法学政治学程序设计语言机器学习计算机网络计算机视觉工程类物理生物统计万维网数据挖掘算法量子力学哲学
出版信息出版商: 出版周期: 期刊类型: journal
基本数据创刊年份: 原创研究文献占比100.00%自引率:0.00%Gold OA占比: 100.00%
平均审稿周期 网友分享经验:13 Weeks

期刊引文格式

这些示例是对学术期刊文章的引用,以及它们应该如何出现在您的参考文献中。

并非所有期刊都按卷和期组织其已发表的文章,因此这些字段是可选的。有些电子期刊不提供页面范围,而是列出文章标识符。在这种情况下,使用文章标识符而不是页面范围是安全的。

只有1位作者的期刊

有2位作者的期刊

有3位作者的期刊

有5位以上作者的期刊

书籍引用格式

以下是创作和编辑的书籍的参考文献的示例。

学位论文引用格式

网页引用格式

这些示例是对网页的引用,以及它们应该如何出现在您的参考文献中。

专利引用格式

最新文章

Access control for trusted data sharing

2024-9-10

DQ-NN and phantom routing for enhanced source location privacy for IoT under multiple source and destination

2024-9-5

Trajectory-aware privacy-preserving method with local differential privacy in crowdsourcing

2024-9-2

Enhancing internet of things security using entropy-informed RF-DNA fingerprint learning from Gabor-based images

2024-8-15

Cover-source mismatch in steganalysis: systematic review

2024-8-12

HyperWallet: cryptocurrency wallet as a secure hypervisor-based application

2024-8-8

Reversible anonymization for privacy of facial biometrics via cyclic learning

2024-8-5

Performance comparison of quantum-safe multivariate polynomial public key encapsulation algorithm

2024-7-9

Errorless robust JPEG steganography using steganographic polar codes

2024-7-4

Mining digital identity insights: patent analysis using NLP

2024-7-3

Peer-to-peer botnets: exploring behavioural characteristics and machine/deep learning-based detection

2024-5-27

Retraction Note: RFID tag recognition model for Internet of Things for training room management

2024-5-13

Retraction Note: Hierarchical energy-saving routing algorithm using fuzzy logic in wireless sensor networks

2024-5-13

Retraction Note: The design of network security protection trust management system based on an improved hidden Markov model

2024-5-13

Retraction Note: Efficient identity security authentication method based on improved R-LWE algorithm in IoT environment

2024-5-10

Retraction Note: Node fault diagnosis algorithm for wireless sensor networks based on BN and WSN

2024-5-10

Retraction Note: Improved RFID mutual authentication protocol against exhaustive attack in the context of big data

2024-5-10

Retraction Note: Research on privacy and secure storage protection of personalized medical data based on hybrid encryption

2024-5-10

Retraction Note: IoT devices and data availability optimization by ANN and KNN

2024-5-8

Retraction Note: Network security threat detection technology based on EPSO-BP algorithm

2024-5-7

Machine learning security and privacy: a review of threats and countermeasures

2024-4-23

Intelligent multi-agent model for energy-efficient communication in wireless sensor networks

2024-4-8

FEDDBN-IDS: federated deep belief network-based wireless network intrusion detection system

2024-4-4

Cancelable templates for secure face verification based on deep learning and random projections

2024-3-8

RFID tag recognition model for Internet of Things for training room management

2024-2-24

Network security threat detection technology based on EPSO-BP algorithm

2024-2-24

Efficient identity security authentication method based on improved R-LWE algorithm in IoT environment

2024-2-22

Improved RFID mutual authentication protocol against exhaustive attack in the context of big data

2024-1-31

RETRACTED ARTICLE: IoT devices and data availability optimization by ANN and KNN

2024-1-2

Research on privacy and secure storage protection of personalized medical data based on hybrid encryption

2024-1-2

Node fault diagnosis algorithm for wireless sensor networks based on BN and WSN

2023-12-13

Robust JPEG steganography based on the robustness classifier

2023-12-11

The design of network security protection trust management system based on an improved hidden Markov model

2023-11-23

Hierarchical energy-saving routing algorithm using fuzzy logic in wireless sensor networks

2023-10-19

Correction: Mobile authentication of copy detection patterns

2023-10-3

User authentication and access control to blockchain-based forensic log data

2023-7-25

Network traffic classification model based on attention mechanism and spatiotemporal features

2023-7-12

Network intrusion detection based on multi-domain data and ensemble-bidirectional LSTM

2023-6-26

Mobile authentication of copy detection patterns

2023-6-6

Gaussian class-conditional simplex loss for accurate, adversarially robust deep classifier training

2023-3-10

A multi-gateway authentication and key-agreement scheme on wireless sensor networks for IoT

2023-3-8

Image life trails based on contrast reduction models for face counter-spoofing

2023-1-16

Improved scheme and evaluation method for progressive visual cryptography

2022-12-17

Human-artificial intelligence approaches for secure analysis in CAPTCHA codes

2022-12-12

“Alexa, What’s a Phishing Email?”: Training users to spot phishing emails using a voice assistant

2022-11-22

Behavior-based user authentication on mobile devices in various usage contexts

2022-9-16

Presentation attack detection and biometric recognition in a challenge-response formalism

2022-9-5

Robust video steganography for social media sharing based on principal component analysis

2022-6-20

On the methodology of fingerprint template protection schemes conception : meditations on the reliability

2022-3-25

DIPPAS: a deep image prior PRNU anonymization scheme

2022-2-14

帮你贴心管理全部的文献

研飞ivySCI,高效的论文管理

投稿经验分享

分享我的经验,帮你走得更远

Built withby Ivy Science
Copyright © 2020-2024
版权所有:南京青藤格致信息科技有限公司