研飞客户端支持数万种期刊查询,助你在阅读和写作中随时了解期刊动态
EURASIP Journal on Information Security
短名 | |
Journal Impact | 2.46 |
国际分区 | COMPUTER SCIENCE, INFORMATION SYSTEMS(Q2) |
ISSN | 2510-523X |
h-index |
阅读文献时,研飞即可帮你快速了解期刊,查询影响因子与分区,智能高亮期刊预警!
涉及主题 | 计算机科学计算机安全操作系统人工智能数学法学政治学程序设计语言机器学习计算机网络计算机视觉工程类物理生物统计万维网数据挖掘算法量子力学哲学 |
出版信息 | 出版商: SpringerOpen,出版周期: ,期刊类型: journal |
基本数据 | 创刊年份: 2007,原创研究文献占比: 100.00%,自引率:0.00%, Gold OA占比: 100.00% |
平均审稿周期 | 网友分享经验:13 Weeks |
期刊引文格式
这些示例是对学术期刊文章的引用,以及它们应该如何出现在您的参考文献中。
并非所有期刊都按卷和期组织其已发表的文章,因此这些字段是可选的。有些电子期刊不提供页面范围,而是列出文章标识符。在这种情况下,使用文章标识符而不是页面范围是安全的。
只有1位作者的期刊
有2位作者的期刊
有3位作者的期刊
有5位以上作者的期刊
书籍引用格式
以下是创作和编辑的书籍的参考文献的示例。
学位论文引用格式
网页引用格式
这些示例是对网页的引用,以及它们应该如何出现在您的参考文献中。
专利引用格式
手工熬夜修改参考文献?研飞自动匹配期刊,一键轻松成稿,支持 Word/WPS
点击下方按钮,免费开启试用!
最新文章
Access control for trusted data sharing
2024-9-10
DQ-NN and phantom routing for enhanced source location privacy for IoT under multiple source and destination
2024-9-5
Trajectory-aware privacy-preserving method with local differential privacy in crowdsourcing
2024-9-2
Enhancing internet of things security using entropy-informed RF-DNA fingerprint learning from Gabor-based images
2024-8-15
Cover-source mismatch in steganalysis: systematic review
2024-8-12
HyperWallet: cryptocurrency wallet as a secure hypervisor-based application
2024-8-8
Reversible anonymization for privacy of facial biometrics via cyclic learning
2024-8-5
Performance comparison of quantum-safe multivariate polynomial public key encapsulation algorithm
2024-7-9
Errorless robust JPEG steganography using steganographic polar codes
2024-7-4
Mining digital identity insights: patent analysis using NLP
2024-7-3
Peer-to-peer botnets: exploring behavioural characteristics and machine/deep learning-based detection
2024-5-27
Retraction Note: RFID tag recognition model for Internet of Things for training room management
2024-5-13
Retraction Note: Hierarchical energy-saving routing algorithm using fuzzy logic in wireless sensor networks
2024-5-13
Retraction Note: The design of network security protection trust management system based on an improved hidden Markov model
2024-5-13
Retraction Note: Node fault diagnosis algorithm for wireless sensor networks based on BN and WSN
2024-5-10
Retraction Note: Improved RFID mutual authentication protocol against exhaustive attack in the context of big data
2024-5-10
Retraction Note: Efficient identity security authentication method based on improved R-LWE algorithm in IoT environment
2024-5-10
Retraction Note: Research on privacy and secure storage protection of personalized medical data based on hybrid encryption
2024-5-10
Retraction Note: IoT devices and data availability optimization by ANN and KNN
2024-5-8
Retraction Note: Network security threat detection technology based on EPSO-BP algorithm
2024-5-7
Machine learning security and privacy: a review of threats and countermeasures
2024-4-23
Intelligent multi-agent model for energy-efficient communication in wireless sensor networks
2024-4-8
FEDDBN-IDS: federated deep belief network-based wireless network intrusion detection system
2024-4-4
Cancelable templates for secure face verification based on deep learning and random projections
2024-3-8
RFID tag recognition model for Internet of Things for training room management
2024-2-24
Network security threat detection technology based on EPSO-BP algorithm
2024-2-24
Efficient identity security authentication method based on improved R-LWE algorithm in IoT environment
2024-2-22
Improved RFID mutual authentication protocol against exhaustive attack in the context of big data
2024-1-31
RETRACTED ARTICLE: IoT devices and data availability optimization by ANN and KNN
2024-1-2
Research on privacy and secure storage protection of personalized medical data based on hybrid encryption
2024-1-2
Node fault diagnosis algorithm for wireless sensor networks based on BN and WSN
2023-12-13
Robust JPEG steganography based on the robustness classifier
2023-12-11
The design of network security protection trust management system based on an improved hidden Markov model
2023-11-23
Hierarchical energy-saving routing algorithm using fuzzy logic in wireless sensor networks
2023-10-19
Correction: Mobile authentication of copy detection patterns
2023-10-3
User authentication and access control to blockchain-based forensic log data
2023-7-25
Network traffic classification model based on attention mechanism and spatiotemporal features
2023-7-12
Network intrusion detection based on multi-domain data and ensemble-bidirectional LSTM
2023-6-26
Mobile authentication of copy detection patterns
2023-6-6
Gaussian class-conditional simplex loss for accurate, adversarially robust deep classifier training
2023-3-10
A multi-gateway authentication and key-agreement scheme on wireless sensor networks for IoT
2023-3-8
Image life trails based on contrast reduction models for face counter-spoofing
2023-1-16
Improved scheme and evaluation method for progressive visual cryptography
2022-12-17
Human-artificial intelligence approaches for secure analysis in CAPTCHA codes
2022-12-12
“Alexa, What’s a Phishing Email?”: Training users to spot phishing emails using a voice assistant
2022-11-22
Behavior-based user authentication on mobile devices in various usage contexts
2022-9-16
Presentation attack detection and biometric recognition in a challenge-response formalism
2022-9-5
Robust video steganography for social media sharing based on principal component analysis
2022-6-20
On the methodology of fingerprint template protection schemes conception : meditations on the reliability
2022-3-25
DIPPAS: a deep image prior PRNU anonymization scheme
2022-2-14
帮你贴心管理全部的文献
研飞ivySCI,高效的论文管理
投稿经验分享
分享我的经验,帮你走得更远