---
_id: '64197'
article_number: '103832'
author:
- first_name: Avinash Kumar
  full_name: Chaurasia, Avinash Kumar
  last_name: Chaurasia
- first_name: Matin
  full_name: Fallahi, Matin
  last_name: Fallahi
- first_name: Thorsten
  full_name: Strufe, Thorsten
  last_name: Strufe
- first_name: Philipp
  full_name: Terhörst, Philipp
  id: '97123'
  last_name: Terhörst
- first_name: Patricia Arias
  full_name: Cabarcos, Patricia Arias
  last_name: Cabarcos
citation:
  ama: 'Chaurasia AK, Fallahi M, Strufe T, Terhörst P, Cabarcos PA. NeuroIDBench:
    An open-source benchmark framework for the standardization of methodology in brainwave-based
    authentication research. <i>Journal of Information Security and Applications</i>.
    2024;85. doi:<a href="https://doi.org/10.1016/j.jisa.2024.103832">10.1016/j.jisa.2024.103832</a>'
  apa: 'Chaurasia, A. K., Fallahi, M., Strufe, T., Terhörst, P., &#38; Cabarcos, P.
    A. (2024). NeuroIDBench: An open-source benchmark framework for the standardization
    of methodology in brainwave-based authentication research. <i>Journal of Information
    Security and Applications</i>, <i>85</i>, Article 103832. <a href="https://doi.org/10.1016/j.jisa.2024.103832">https://doi.org/10.1016/j.jisa.2024.103832</a>'
  bibtex: '@article{Chaurasia_Fallahi_Strufe_Terhörst_Cabarcos_2024, title={NeuroIDBench:
    An open-source benchmark framework for the standardization of methodology in brainwave-based
    authentication research}, volume={85}, DOI={<a href="https://doi.org/10.1016/j.jisa.2024.103832">10.1016/j.jisa.2024.103832</a>},
    number={103832}, journal={Journal of Information Security and Applications}, publisher={Elsevier
    BV}, author={Chaurasia, Avinash Kumar and Fallahi, Matin and Strufe, Thorsten
    and Terhörst, Philipp and Cabarcos, Patricia Arias}, year={2024} }'
  chicago: 'Chaurasia, Avinash Kumar, Matin Fallahi, Thorsten Strufe, Philipp Terhörst,
    and Patricia Arias Cabarcos. “NeuroIDBench: An Open-Source Benchmark Framework
    for the Standardization of Methodology in Brainwave-Based Authentication Research.”
    <i>Journal of Information Security and Applications</i> 85 (2024). <a href="https://doi.org/10.1016/j.jisa.2024.103832">https://doi.org/10.1016/j.jisa.2024.103832</a>.'
  ieee: 'A. K. Chaurasia, M. Fallahi, T. Strufe, P. Terhörst, and P. A. Cabarcos,
    “NeuroIDBench: An open-source benchmark framework for the standardization of methodology
    in brainwave-based authentication research,” <i>Journal of Information Security
    and Applications</i>, vol. 85, Art. no. 103832, 2024, doi: <a href="https://doi.org/10.1016/j.jisa.2024.103832">10.1016/j.jisa.2024.103832</a>.'
  mla: 'Chaurasia, Avinash Kumar, et al. “NeuroIDBench: An Open-Source Benchmark Framework
    for the Standardization of Methodology in Brainwave-Based Authentication Research.”
    <i>Journal of Information Security and Applications</i>, vol. 85, 103832, Elsevier
    BV, 2024, doi:<a href="https://doi.org/10.1016/j.jisa.2024.103832">10.1016/j.jisa.2024.103832</a>.'
  short: A.K. Chaurasia, M. Fallahi, T. Strufe, P. Terhörst, P.A. Cabarcos, Journal
    of Information Security and Applications 85 (2024).
date_created: 2026-02-18T09:34:55Z
date_updated: 2026-02-19T07:51:21Z
doi: 10.1016/j.jisa.2024.103832
intvolume: '        85'
language:
- iso: eng
publication: Journal of Information Security and Applications
publication_identifier:
  issn:
  - 2214-2126
publication_status: published
publisher: Elsevier BV
status: public
title: 'NeuroIDBench: An open-source benchmark framework for the standardization of
  methodology in brainwave-based authentication research'
type: journal_article
user_id: '97123'
volume: 85
year: '2024'
...
---
_id: '20724'
author:
- first_name: Andreas
  full_name: Follner, Andreas
  last_name: Follner
- first_name: Eric
  full_name: Bodden, Eric
  id: '59256'
  last_name: Bodden
  orcid: 0000-0003-3470-3647
citation:
  ama: Follner A, Bodden E. ROPocop — Dynamic mitigation of code-reuse attacks. <i>Journal
    of Information Security and Applications </i>. 2016;29:16-26. doi:<a href="http://dx.doi.org/10.1016/j.jisa.2016.01.002">http://dx.doi.org/10.1016/j.jisa.2016.01.002</a>
  apa: Follner, A., &#38; Bodden, E. (2016). ROPocop — Dynamic mitigation of code-reuse
    attacks. <i>Journal of Information Security and Applications </i>, <i>29</i>,
    16–26. <a href="http://dx.doi.org/10.1016/j.jisa.2016.01.002">http://dx.doi.org/10.1016/j.jisa.2016.01.002</a>
  bibtex: '@article{Follner_Bodden_2016, title={ROPocop — Dynamic mitigation of code-reuse
    attacks}, volume={29}, DOI={<a href="http://dx.doi.org/10.1016/j.jisa.2016.01.002">http://dx.doi.org/10.1016/j.jisa.2016.01.002</a>},
    journal={Journal of Information Security and Applications }, author={Follner,
    Andreas and Bodden, Eric}, year={2016}, pages={16–26} }'
  chicago: 'Follner, Andreas, and Eric Bodden. “ROPocop — Dynamic Mitigation of Code-Reuse
    Attacks.” <i>Journal of Information Security and Applications </i> 29 (2016):
    16–26. <a href="http://dx.doi.org/10.1016/j.jisa.2016.01.002">http://dx.doi.org/10.1016/j.jisa.2016.01.002</a>.'
  ieee: 'A. Follner and E. Bodden, “ROPocop — Dynamic mitigation of code-reuse attacks,”
    <i>Journal of Information Security and Applications </i>, vol. 29, pp. 16–26,
    2016, doi: <a href="http://dx.doi.org/10.1016/j.jisa.2016.01.002">http://dx.doi.org/10.1016/j.jisa.2016.01.002</a>.'
  mla: Follner, Andreas, and Eric Bodden. “ROPocop — Dynamic Mitigation of Code-Reuse
    Attacks.” <i>Journal of Information Security and Applications </i>, vol. 29, 2016,
    pp. 16–26, doi:<a href="http://dx.doi.org/10.1016/j.jisa.2016.01.002">http://dx.doi.org/10.1016/j.jisa.2016.01.002</a>.
  short: A. Follner, E. Bodden, Journal of Information Security and Applications  29
    (2016) 16–26.
date_created: 2020-12-14T14:11:40Z
date_updated: 2022-01-06T06:54:34Z
department:
- _id: '76'
doi: http://dx.doi.org/10.1016/j.jisa.2016.01.002
intvolume: '        29'
language:
- iso: eng
main_file_link:
- url: http://www.bodden.de/pubs/fb2016ropocop.pdf
page: 16-26
publication: 'Journal of Information Security and Applications '
publication_identifier:
  issn:
  - 2214-2126
status: public
title: ROPocop — Dynamic mitigation of code-reuse attacks
type: journal_article
user_id: '5786'
volume: 29
year: '2016'
...
