Most Recent Articles: EURASIP Journal on Information Securityhttps://jis-eurasipjournals.springeropen.comMost Recent Articles: EURASIP Journal on Information SecurityDCNN: a novel binary and multi-class network intrusion detection model via deep convolutional neural networkhttps://jis-eurasipjournals.springeropen.com/articles/10.1186/s13635-024-00184-1Network security become imperative in the context of our interconnected networks and everyday communications. Recently, many deep learning models have been proposed to tackle the problem of predicting intrusio...ResearchFri, 20 Dec 2024 00:00:00 GMThttps://jis-eurasipjournals.springeropen.com/articles/10.1186/s13635-024-00184-1Ahmed Shebl, E. I. Elsedimy, A. Ismail, A. A. Salama and Mostafa Herajy2024-12-20T00:00:00ZReinforcing cybersecurity with Bloom filters: a novel approach to password cracking efficiencyhttps://jis-eurasipjournals.springeropen.com/articles/10.1186/s13635-024-00183-2Safeguarding digital information against unauthorized access is critical in the industry context. Techniques for cracking passwords are essential tools for both attackers and defenders. This study explores the...ResearchMon, 04 Nov 2024 00:00:00 GMThttps://jis-eurasipjournals.springeropen.com/articles/10.1186/s13635-024-00183-2I. Tasic, A. Villafranca and Maria-Dolores Cano2024-11-04T00:00:00ZCoFFEE: a codec-based forensic feature extraction and evaluation software for H.264 videoshttps://jis-eurasipjournals.springeropen.com/articles/10.1186/s13635-024-00181-4The forensic analysis of digital videos is becoming increasingly relevant to deal with forensic cases, propaganda, and fake news. The research community has developed numerous forensic tools to address various...ResearchWed, 23 Oct 2024 00:00:00 GMThttps://jis-eurasipjournals.springeropen.com/articles/10.1186/s13635-024-00181-4Giulia Bertazzini, Daniele Baracchi, Dasara Shullani, Massimo Iuliani and Alessandro Piva2024-10-23T00:00:00ZStatic analysis framework for permission-based dataset generation and android malware detection using machine learninghttps://jis-eurasipjournals.springeropen.com/articles/10.1186/s13635-024-00182-3Since Android is the popular mobile operating system worldwide, malicious attackers seek out Android smartphones as _targets. The Android malware can be identified through a number of established detection tech...ResearchWed, 23 Oct 2024 00:00:00 GMThttps://jis-eurasipjournals.springeropen.com/articles/10.1186/s13635-024-00182-3Amarjyoti Pathak, Th. Shanta Kumar and Utpal Barman2024-10-23T00:00:00ZStrategic safeguarding: A game theoretic approach for analyzing attacker-defender behavior in DNN backdoorshttps://jis-eurasipjournals.springeropen.com/articles/10.1186/s13635-024-00180-5Deep neural networks (DNNs) are fundamental to modern applications like face recognition and autonomous driving. However, their security is a significant concern due to various integrity risks, such as backdoo...ResearchTue, 15 Oct 2024 00:00:00 GMThttps://jis-eurasipjournals.springeropen.com/articles/10.1186/s13635-024-00180-5Kassem Kallas, Quentin Le Roux, Wassim Hamidouche and Teddy Furon2024-10-15T00:00:00Z