TY - JOUR AU - Carcary, M. AU - Renaud, K. AU - Mclaughlin, S. PY - 2016 DA - 2016// TI - A framework for information security governance and management JO - IT Prof. VL - 18 UR - https://doi.org/10.1109/MITP.2016.27 DO - 10.1109/MITP.2016.27 ID - Carcary2016 ER - TY - STD TI - X. Wu, N. Qi, K. Wang, et al., in Iihmsp '08 International Conference on Intelligent Information Hiding and Multimedia Signal Processing. An iris cryptosystem for information security (IEEE, Elsevier Advanced Technology Publications Oxford, 2008), pp. 1533–1536 ID - ref2 ER - TY - JOUR AU - Daugman, J. PY - 1999 DA - 1999// TI - Information security technical report - prospectus: recognizing people by their iris patterns JO - Inf. Secur. Tech Rep. VL - 4 UR - https://doi.org/10.1016/S1363-4127(99)80055-7 DO - 10.1016/S1363-4127(99)80055-7 ID - Daugman1999 ER - TY - JOUR AU - Abdul, W. AU - Alzamil, A. AU - Masri, H. PY - 2017 DA - 2017// TI - Fingerprint and iris template protection for health information system access and security JO - J. Med. Imaging Health Inform. VL - 7 UR - https://doi.org/10.1166/jmihi.2017.2149 DO - 10.1166/jmihi.2017.2149 ID - Abdul2017 ER - TY - STD TI - S. Zhou, X. Lu, in Information Science and Management Engineering. Fingerprint identification and its applications in information security fields (IEEE, Shaanxi, 2010), pp. 97–99 ID - ref5 ER - TY - JOUR AU - Mahmoud Musleh, M. M. AU - Ba, I. I. AU - Nofal, K. M. A. PY - 2012 DA - 2012// TI - Improving information security in e-banking by using biometric fingerprint: a case of major bank in Malaysia JO - Int. J. Comput. Sci. Inf. Secur. VL - 10 ID - Mahmoud Musleh2012 ER - TY - STD TI - J. Shang, H. Huang, in International Conference on Computer Science and Service System. Shallow fingerprint identification information security technology in the electronic commerce application (IEEE, 2011), pp. 1684–1687 ID - ref7 ER - TY - BOOK AU - Ryu, H. PY - 2016 DA - 2016// TI - Information security attachment device for voice communication and information security method for voice communication using the same ID - Ryu2016 ER - TY - JOUR AU - Johnson, L. A. AU - Dempsey, K. L. AU - Bailey, D. PY - 2011 DA - 2011// TI - SP 800-128. Guide for security-focused configuration management of information systems JO - J. Dairy Sci. VL - 77 ID - Johnson2011 ER - TY - JOUR AU - Chouhan, J. G. AU - Singh, N. K. AU - Modi, P. S. PY - 2016 DA - 2016// TI - Camera and voice control based location services and information security on android JO - J. Inf. Secur. VL - 07 ID - Chouhan2016 ER - TY - STD TI - G. Cui, L. Qin, Y. Wang, et al., in IEEE International Workshop on Anti-Counterfeiting, Security, Identification. Information security technology based on DNA computing (IEEE, Xiamen, 2007), pp. 288–291 ID - ref11 ER - TY - BOOK AU - Cui, G. AU - Qin, L. AU - Wang, Y. PY - 2007 DA - 2007// TI - Information Security Technology Based on DNA Computing ID - Cui2007 ER - TY - STD TI - G. Cui, C. Li, H. Li, et al., in International Conference on Natural Computation. DNA computing and its application to information security field (IEEE Computer Society, Tianjin, 2009), pp. 148–152 ID - ref13 ER - TY - BOOK AU - Mizuchi, Y. AU - Hagiwara, Y. AU - Suzuki, A. PY - 2013 DA - 2013// TI - Monocular 3D Palm Posture Estimation Based on Feature-Points Robust Against Finger Motion ID - Mizuchi2013 ER - TY - JOUR AU - Bhilare, S. h. r. u. t. i. AU - Jaswal, G. a. u. r. a. v. AU - Kanhangad, V. i. v. e. k. AU - Nigam, A. d. i. t. y. a. PY - 2018 DA - 2018// TI - Single-sensor hand-vein multimodal biometric recognition using multiscale deep pyramidal approach JO - Machine Vision and Applications VL - 29 UR - https://doi.org/10.1007/s00138-018-0959-2 DO - 10.1007/s00138-018-0959-2 ID - Bhilare2018 ER - TY - STD TI - Y. Rao, J. Ni, in IEEE International Workshop on Information Forensics and Security. A deep learning approach to detection of splicing and copy-move forgeries in images (IEEE, London, 2017), pp. 1–6 ID - ref16 ER - TY - JOUR AU - Ye, J. AU - Ni, J. AU - Yi, Y. PY - 2017 DA - 2017// TI - Deep learning hierarchical representations for image steganalysis JO - IEEE Trans. Inf. Forensics Secur. VL - 12 UR - https://doi.org/10.1109/TIFS.2017.2710946 DO - 10.1109/TIFS.2017.2710946 ID - Ye2017 ER - TY - CHAP AU - Aminanto, M. E. AU - Kim, K. PY - 2016 DA - 2016// TI - Detecting impersonation attack in WiFi networks using deep learning approach BT - International Workshop on Information Security Applications PB - Springer CY - Cham ID - Aminanto2016 ER - TY - CHAP AU - Le, T. P. AU - Aono, Y. AU - Hayashi, T. PY - 2017 DA - 2017// TI - Privacy-preserving deep learning: revisited and enhanced BT - International Conference on Applications and Techniques in Information Security PB - Springer CY - Singapore ID - Le2017 ER - TY - STD TI - Z. Chen, D.O. Information, Face deep learning technology in the design and implementation of the security in colleges and universities. J. Anyang Inst. Technol. 16(6),70-75(2017) ID - ref20 ER - TY - JOUR AU - Kumar, M. AU - Mao, Y. H. AU - Wang, Y. H. AU - Qiu, T. R. AU - Yang, C. AU - Zhang, W. P. PY - 2017 DA - 2017// TI - Fuzzy theoretic approach to signals and systems: static systems JO - Inf. Sci. VL - 418 UR - https://doi.org/10.1016/j.ins.2017.08.048 DO - 10.1016/j.ins.2017.08.048 ID - Kumar2017 ER - TY - JOUR AU - Zhang, W. P. AU - Yang, J. Z. AU - Fang, Y. L. AU - Chen, H. Y. AU - Mao, Y. H. AU - Kumar, M. PY - 2017 DA - 2017// TI - Analytical fuzzy approach to biological data analysis JO - Saudi J. Biol. Sci. VL - 24 UR - https://doi.org/10.1016/j.sjbs.2017.01.027 DO - 10.1016/j.sjbs.2017.01.027 ID - Zhang2017 ER -