


default search action
EURASIP Journal on Information Security, Volume 2025
Volume 2025, Number 1, December 2025
- Akashdeep Bhardwaj, Salil Bharany, Ateeq Ur Rehman, Ghanshyam G. Tejani, Seada Hussen:
Securing cyber-physical robotic systems for enhanced data security and real-time threat mitigation. 1 - Zahra Ebadi Ansaroudi, Giada Sciarretta, Andrea De Maria, Silvio Ranise:
Navigating secure storage requirements for EUDI Wallets: a review paper. 2 - Rongrong Gong, Ruiyi He, Dengyong Zhang, Arun Kumar Sangaiah, Mohammed J. F. Alenazi:
Robust face forgery detection integrating local texture and global texture information. 3 - Pavol Sokol, Laura Bachnáková Rózenfeldová:
Content blocking mechanism in cybersecurity: Slovakia case study. 4 - Setia Juli Irzal Ismail, Hendrawan, Budi Rahardjo, Tutun Juhana, Yasuo Musashi:
MIDALF - multimodal image and audio late fusion for malware detection. 5 - Da Teng, Yanqing Yao, Chao Huang:
Optimizing signature space performance in privacy-enhanced blockchains: novel ring signature solutions. 6 - Hazal Su Biçakci Yesilkaya
, Richard Guest:
Activity-aware electrocardiogram biometric verification utilising deep learning on wearable devices. 7 - Sara Lazzaro, Vincenzo De Angelis, Francesco Buccafurri:
Hiding identities of MQTT devices against a global network adversary. 8 - Dipak K. Rabari, Yogesh K. Meghrajani, Laxmi S. Desai:
Universal share-based two-in-one multi-image secret sharing scheme by rotating random grids. 9 - Wei Sun:
Malicious software identification based on deep learning algorithms and API feature extraction. 10 - Yong Yang, Xing Peng:
BERT-based network for intrusion detection system. 11 - Leonhard Ziegler, Michael Grabatin, Daniela Pöhn
, Wolfgang Hommel:
Designing a security incident response process for self-sovereign identities. 12 - Rima Ouidad Belguechi, Christophe Rosenberger
:
Mitigate authentication attack risk on cancelable biometrics by leveraging attacker knowledge. 13 - Jiangang Wang, Xiaoyan Wang:
An optimization model of computer network security based on GABP neural network algorithm. 14 - Krittin Thirasak, Danupat Chainarong, Teerawat Chuaphanngam, Somchart Fugkeaw:
SSX-EHRs: secure and scalable cross-domain EHRs sharing with blockchain sharding and dynamic proxy re-encryption. 15 - Osvaldo Arreche, Mustafa Abdallah:
A comparative analysis of DNN-based white-box explainable AI methods in network security. 16 - Osman Abul, Melike Burakgazi Bilgen:
Jointly Achieving Smart Homes Security and Privacy through Bidirectional Trust. 17 - Yehia Ibrahim Alzoubi, Alok Mishra
:
Differential privacy and artificial intelligence: potentials, challenges, and future avenues. 18 - Kranthi Kumar Singamaneni:
A novel lightweight hybrid cryptographic framework for secure smart card operations. 19 - Valentina Fohr, Christian Rathgeb:
Deep multi-biometric fuzzy commitment scheme: fusion methods and performance. 20 - Aditya Subash, Insu Song, Ickjai Lee, Kyungmi Lee:
Integrating user demographic parameters for mouse behavioral biometric-based assessment fraud detection in online education platforms. 21 - Chetan Gupta
, Amit Kumar, Neelesh Kumar Jain:
Intelligent intrusion detection system based on crowd search optimization for attack classification in network security. 22 - Lorenzo Cirillo, Andrea Gervasio, Irene Amerini:
Explainability-driven adversarial robustness assessment for generalized deepfake detectors. 23 - Qiushi Li, Shenghai Luo, Shunquan Tan, Zhenjun Li:
SEAP: squeeze-and-excitation attention guided pruning for lightweight steganalysis networks. 24 - Malki Ishara Wasundara, Junwei Zhou, Yanchao Yang, Dongdong Zhao, Jianwen Xiang:
Semi-supervised method for anomaly detection in HTTP traffic. 25

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.