International Journal of Information Security

Papers
(The H4-Index of International Journal of Information Security is 32. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2022-05-01 to 2026-05-01.)
ArticleCitations
BitCracker: BitLocker meets GPUs214
AutoPKI: public key infrastructure for IoT with automated trust transfer92
Verifiability for privacy-preserving computing on distributed data — a survey80
Using machine learning to detect network intrusions in industrial control systems: a survey77
The rise of “security and privacy”: bibliometric analysis of computer privacy research66
Outlier-oriented poisoning attack: a grey-box approach to disturb decision boundaries by perturbing outliers in multiclass learning63
Efficient arabic and english social spam detection using a transformer and 2D convolutional neural network-based deep learning filter58
Fast but approximate homomorphic k-means based on masking technique57
Systematic review of SIEM technology: SIEM-SC birth49
Feature engineering impact on position falsification attacks detection in vehicular ad-hoc network48
Weighted quality criteria for cyber threat intelligence: assessment and prioritisation in the MISP data model47
An intrusion detection approach based on incremental long short-term memory47
Malware classification approaches utilizing binary and text encoding of permissions45
Fairness as a Service (FaaS): verifiable and privacy-preserving fairness auditing of machine learning systems44
Balancing usability, user experience, security and privacy in XR systems: a multidimensional approach44
A comprehensive approach for mitigating impersonation in online assessment: integrity policy and random authentication44
Xai-driven black-box adversarial attacks on network intrusion detectors43
BLoCNet: a hybrid, dataset-independent intrusion detection system using deep learning42
can-sleuth: Sleuthing out the capabilities, limitations, and performance impacts of automotive intrusion detection datasets42
Adaptive trust evaluation model based on container security analysis in the Docker platform41
Automated broken object-level authorization attack detection in REST APIs through OpenAPI to colored petri nets transformation41
Random resampling algorithms for addressing the imbalanced dataset classes in insider threat detection40
A vulnerability assessment and exploitation analysis of a powerline communication HomePlug AV network adapter39
Acnn: arbitrary trace attacks based on leakage area detection38
Restricting data-leakage using fine-grained access control on OSN objects37
A perspective–retrospective analysis of diversity in signature-based open-source network intrusion detection systems36
Pseudonym shuffling-driven blockchain and Autoencoder-based secure E-healthcare data management35
Explainable AI based dynamic cybersecurity risk management for cyber insurability35
MEDICALHARM: A threat modeling designed for modern medical devices and a comprehensive study on effectiveness, user satisfaction, and security perspectives35
Model-Agnostic Utility-Preserving Biometric Information Anonymization33
Unmasking the common traits: an ensemble approach for effective malware detection33
Towards enhanced cybersecurity in industrial control systems: a systematic review of context-based modeling, digital twins, and machine learning approaches33
Ensemble learning-based adaptive and adversarial techniques for APT attack detection32
A large scale analysis of code security in public repositories32
0.16416001319885