International Journal of Information Security

Papers
(The H4-Index of International Journal of Information Security is 25. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2021-11-01 to 2025-11-01.)
ArticleCitations
The rise of “security and privacy”: bibliometric analysis of computer privacy research142
An intrusion detection approach based on incremental long short-term memory136
Using machine learning to detect network intrusions in industrial control systems: a survey83
Feature engineering impact on position falsification attacks detection in vehicular ad-hoc network59
Verifiability for privacy-preserving computing on distributed data — a survey57
Fast but approximate homomorphic k-means based on masking technique57
AutoPKI: public key infrastructure for IoT with automated trust transfer54
Outlier-oriented poisoning attack: a grey-box approach to disturb decision boundaries by perturbing outliers in multiclass learning45
Efficient arabic and english social spam detection using a transformer and 2D convolutional neural network-based deep learning filter37
Systematic review of SIEM technology: SIEM-SC birth36
BitCracker: BitLocker meets GPUs36
Anomalous behavior detection-based approach for authenticating smart home system users35
A comprehensive approach for mitigating impersonation in online assessment: integrity policy and random authentication34
Automated broken object-level authorization attack detection in REST APIs through OpenAPI to colored petri nets transformation32
Fairness as a Service (FaaS): verifiable and privacy-preserving fairness auditing of machine learning systems31
Random resampling algorithms for addressing the imbalanced dataset classes in insider threat detection30
Weighted quality criteria for cyber threat intelligence: assessment and prioritisation in the MISP data model30
BLoCNet: a hybrid, dataset-independent intrusion detection system using deep learning29
Balancing usability, user experience, security and privacy in XR systems: a multidimensional approach28
can-sleuth: Sleuthing out the capabilities, limitations, and performance impacts of automotive intrusion detection datasets27
Adaptive trust evaluation model based on container security analysis in the Docker platform27
Malware classification approaches utilizing binary and text encoding of permissions27
Xai-driven black-box adversarial attacks on network intrusion detectors26
Survey on image encryption techniques using chaotic maps in spatial, transform and spatiotemporal domains26
A vulnerability assessment and exploitation analysis of a powerline communication HomePlug AV network adapter25
Ensemble learning-based adaptive and adversarial techniques for APT attack detection25
Tracing the evolution of cyber resilience: a historical and conceptual review25
Model-Agnostic Utility-Preserving Biometric Information Anonymization25
MEDICALHARM: A threat modeling designed for modern medical devices and a comprehensive study on effectiveness, user satisfaction, and security perspectives25
0.073251962661743