International Journal of Information Security

Papers
(The median citation count of International Journal of Information Security is 1. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2020-04-01 to 2024-04-01.)
ArticleCitations
Robotics cyber security: vulnerabilities, attacks, countermeasures, and recommendations79
A novel scalable intrusion detection system based on deep learning74
Survey on image encryption techniques using chaotic maps in spatial, transform and spatiotemporal domains54
Cyber security in New Space48
MAPAS: a practical deep learning-based android malware detection system38
A blockchain-based medical data preservation scheme for telecare medical information systems26
Public key versus symmetric key cryptography in client–server authentication protocols24
Automatic analysis of attack graphs for risk mitigation and prioritization on large-scale and complex networks in Industry 4.022
Anti-BlUFf: towards counterfeit mitigation in IC supply chains using blockchain and PUF19
A review on fake news detection 3T’s: typology, time of detection, taxonomies19
DAPP: automatic detection and analysis of prototype pollution vulnerability in Node.js modules18
Applying NLP techniques to malware detection in a practical environment18
Intelligent and behavioral-based detection of malware in IoT spectrum sensors13
Using homomorphic encryption for privacy-preserving clustering of intrusion detection alerts13
Securing MQTT protocol for IoT environment using IDS based on ensemble learning12
LASSI: a lightweight authenticated key agreement protocol for fog-enabled IoT deployment12
Classifying resilience approaches for protecting smart grids against cyber threats11
ChoKIFA+: an early detection and mitigation approach against interest flooding attacks in NDN11
A content-based deep intrusion detection system11
Deep SARSA-based reinforcement learning approach for anomaly network intrusion detection system11
A systematic literature review for network intrusion detection system (IDS)10
Risk assessment of cyber-attacks on telemetry-enabled cardiac implantable electronic devices (CIED)10
MalFamAware: automatic family identification and malware classification through online clustering10
An efficient intrusion detection system for MQTT-IoT using enhanced chaotic salp swarm algorithm and LightGBM10
Evaluating visualization approaches to detect abnormal activities in network traffic data10
Attribute-based encryption and sticky policies for data access control in a smart home scenario: a comparison on networked smart object middleware9
Security analysis on “Three-factor authentication protocol using physical unclonable function for IoV”9
Insider attack mitigation in a smart metering infrastructure using reputation score and blockchain technology9
A secure architecture for TCP/UDP-based cloud communications9
Scalable, password-based and threshold authentication for smart homes9
DEALER: decentralized incentives for threat intelligence reporting and exchange8
Design and implementation of a new lightweight chaos-based cryptosystem to secure IoT communications8
Combining behavioral biometrics and session context analytics to enhance risk-based static authentication in web applications8
Highly private blockchain-based management system for digital COVID-19 certificates8
PatrIoT: practical and agile threat research for IoT8
Continuous improvement process (CIP)-based privacy-preserving framework for smart connected toys8
Browser-in-the-Middle (BitM) attack8
Cyber insurance: state of the art, trends and future directions7
Accountable privacy preserving attribute-based access control for cloud services enforced using blockchain7
Thresholdizing HashEdDSA: MPC to the Rescue7
A systematic literature review on wearable health data publishing under differential privacy7
BLoCNet: a hybrid, dataset-independent intrusion detection system using deep learning7
Privacy preserving data sharing and analysis for edge-based architectures7
Machine learning approach to vulnerability detection in OAuth 2.0 authentication and authorization flow7
CT-GCN: a phishing identification model for blockchain cryptocurrency transactions7
DeTRACT: a decentralized, transparent, immutable and open PKI certificate framework6
A trust model for popular smart home devices6
PSO + FL = PAASO: particle swarm optimization + federated learning = privacy-aware agent swarm optimization6
How education level influences internet security knowledge, behaviour, and attitude: a comparison among undergraduates, postgraduates and working graduates6
Revisiting QUIC attacks: a comprehensive review on QUIC security and a hands-on study6
ISM-AC: an immune security model based on alert correlation and software-defined networking6
Dependency-based security risk assessment for cyber-physical systems6
A novel approach for detection of APT malware using multi-dimensional hybrid Bayesian belief network6
An intrusion detection approach based on incremental long short-term memory6
Password-authenticated searchable encryption6
Evaluating card-based protocols in terms of execution time6
Novel trust-aware intrusion detection and prevention system for 5G MANET–Cloud6
A context-centered methodology for IoT forensic investigations6
Systematic review of SIEM technology: SIEM-SC birth6
K maximum probability attack paths generation algorithm for target nodes in networked systems6
On the detection of lateral movement through supervised machine learning and an open-source tool to create turnkey datasets from Sysmon logs5
Mitigating insider threat by profiling users based on mouse usage pattern: ensemble learning and frequency domain analysis5
A wrinkle in time: a case study in DNS poisoning5
The Agent Web Model: modeling web hacking for reinforcement learning5
A study of machine learning-based models for detection, control, and mitigation of cyberbullying in online social media5
Adversarial security mitigations of mmWave beamforming prediction models using defensive distillation and adversarial retraining5
Attention: there is an inconsistency between android permissions and application metadata!5
Privacy in targeted advertising on mobile devices: a survey5
A survey on interest packet flooding attacks and its countermeasures in named data networking5
Cyber–physical risk assessment for false data injection attacks considering moving target defences5
Extending access control in AWS IoT through event-driven functions: an experimental evaluation using a smart lock system5
Additional kernel observer: privilege escalation attack prevention mechanism focusing on system call privilege changes5
From zero-shot machine learning to zero-day attack detection5
Enhancing spatial and temporal utilities in differentially private moving objects database release5
A quantitative assessment of security risks based on a multifaceted classification approach5
Challenges of post-quantum digital signing in real-world applications: a survey4
IoT-oriented high-efficient anti-malware hardware focusing on time series metadata extractable from inside a processor core4
DNS exfiltration detection in the presence of adversarial attacks and modified exfiltrator behaviour4
PageDumper: a mechanism to collect page table manipulation information at run-time4
A survey on analyzing encrypted network traffic of mobile devices4
Authenticated logarithmic-order supersingular isogeny group key exchange4
Efficient attribute-based encryption with repeated attributes optimization4
Defeating traffic analysis via differential privacy: a case study on streaming traffic4
Intrusion detection system over real-time data traffic using machine learning methods with feature selection approaches4
An efficient privacy-preserving pay-by-phone system for regulated parking areas4
An autoML network traffic analyzer for cyber threat detection4
A decentralized honeypot for IoT Protocols based on Android devices4
Studying lattice reduction algorithms improved by quick reordering technique3
Pragmatic authenticated key agreement for IEEE Std 802.15.63
A deep learner model for multi-language webshell detection3
Privacy and safety improvement of VANET data via a safety-related privacy scheme3
Cyber risk management for autonomous passenger ships using threat-informed defense-in-depth3
A comprehensive Blockchain-oriented secure framework for SDN/Fog-based IoUT3
A new smart smudge attack using CNN3
LDES: detector design for version number attack detection using linear temporal logic based on discrete event system3
P2ADF: a privacy-preserving attack detection framework in fog-IoT environment3
Analyzing and comparing the security of self-sovereign identity management systems through threat modeling3
A defensive framework for deepfake detection under adversarial settings using temporal and spatial features3
Random resampling algorithms for addressing the imbalanced dataset classes in insider threat detection3
Special issue on security and privacy of blockchain technologies3
Anomalous behavior detection-based approach for authenticating smart home system users3
Security beyond cybersecurity: side-channel attacks against non-cyber systems and their countermeasures3
Early web application attack detection using network traffic analysis3
A risk-level assessment system based on the STRIDE/DREAD model for digital data marketplaces3
An SDN approach to detect targeted attacks in P2P fully connected overlays3
An anonymous and unlinkable electronic toll collection system3
Energy-efficient trust-aware secured neuro-fuzzy clustering with sparrow search optimization in wireless sensor network3
SealFSv2: combining storage-based and ratcheting for tamper-evident logging3
A multi-objective cost–benefit optimization algorithm for network hardening3
Multi-cloud applications: data and code fragmentation for improved security3
A Digital Asset Inheritance Model to Convey Online Persona Posthumously3
Are chrome extensions compliant with the spirit of least privilege?2
Security analysis and improvement of a privacy-preserving authentication scheme in VANET2
Effective network intrusion detection using stacking-based ensemble approach2
Web access monitoring mechanism via Android WebView for threat analysis2
Federated learning-based intrusion detection system for Internet of Things2
A novel frame switching model based on virtual MAC in SDN2
A first look at references from the dark to the surface web world: a case study in Tor2
Coin-based Secure Computations2
Modeling reporting delays in cyber incidents: an industry-level comparison2
Malicious website identification using design attribute learning2
Cyber range design framework for cyber security education and training2
Evaluation of neural networks defenses and attacks using NDCG and reciprocal rank metrics2
Bu-Dash: a universal and dynamic graphical password scheme (extended version)2
Cybersecurity challenges in IoT-based smart renewable energy2
User identification using deep learning and human activity mobile sensor data2
Malicious code detection in android: the role of sequence characteristics and disassembling methods2
Enhanced models for privacy and utility in continuous-time diffusion networks2
Mobile botnet detection: a comprehensive survey2
Causal effect analysis-based intrusion detection system for IoT applications2
DFTMicroagg: a dual-level anonymization algorithm for smart grid data2
ANS-based compression and encryption with 128-bit security2
Error reduction of SRAM-based physically unclonable function for chip authentication2
Automated benchmark network diversification for realistic attack simulation with application to moving target defense2
ThunderSecure: deploying real-time intrusion detection for 100G research networks by leveraging stream-based features and one-class classification network2
Privacy-preserving continuous authentication using behavioral biometrics2
Cryptanalysis of a non-interactive deniable ring signature scheme2
Algorithm substitution attacks against receivers2
Enabling isolation and recovery in PLC redundancy framework of metro train systems2
Octopus: privacy preserving peer-to-peer transactions system with InterPlanetary file system (IPFS)2
Detection of adversarial attacks based on differences in image entropy2
Tracking adoption of revocation and cryptographic features in X.509 certificates2
Securing the controller area network with covert voltage channels2
A comprehensive survey of phishing: mediums, intended targets, attack and defence techniques and a novel taxonomy2
A full privacy-preserving distributed batch-based certificate-less aggregate signature authentication scheme for healthcare wearable wireless medical sensor networks (HWMSNs)2
A technical characterization of APTs by leveraging public resources2
Secure cloud-based mobile apps: attack taxonomy, requirements, mechanisms, tests and automation2
BAPRP: a machine learning approach to blackhole attacks prevention routing protocol in vehicular Ad Hoc networks2
Evaluating differentially private decision tree model over model inversion attack2
AiCEF: an AI-assisted cyber exercise content generation framework using named entity recognition2
A semantic-aware log generation method for network activities2
A novel malicious remote administration tool using stealth and self-defense techniques2
Network intrusion detection and mitigation in SDN using deep learning models1
Efficient searchable symmetric encryption supporting range queries1
A novel two-level secure access control approach for blockchain platform in healthcare1
An ensemble approach-based intrusion detection system utilizing ISHO-HBA and SE-ResNet1521
Protection of centralized SDN control plane from high-rate Packet-In messages1
Improving the security of direct anonymous attestation under host corruptions1
OCPP in the spotlight: threats and countermeasures for electric vehicle charging infrastructures 4.01
Lib2Desc: automatic generation of security-centric Android app descriptions using third-party libraries1
A systematic overview on methods to protect sensitive data provided for various analyses1
Tracing the evolution of cyber resilience: a historical and conceptual review1
BitCracker: BitLocker meets GPUs1
A blockchain-enabled collaborative intrusion detection framework for SDN-assisted cyber-physical systems1
Yet another cybersecurity risk assessment framework1
Attribute disclosure risk for k-anonymity: the case of numerical data1
AAIA: an efficient aggregation scheme against inverting attack for federated learning1
Phish-Sight: a new approach for phishing detection using dominant colors on web pages and machine learning1
Data space randomization for securing cyber-physical systems1
Maintaining the level of operational effectiveness of a CSOC under adverse conditions1
Olympus: a GDPR compliant blockchain system1
Estimating vulnerability metrics with word embedding and multiclass classification methods1
Design and analysis of DDoS mitigating network architecture1
An interpretability security framework for intelligent decision support systems based on saliency map1
A unit-based symbolic execution method for detecting memory corruption vulnerabilities in executable codes1
INCHAIN: a cyber insurance architecture with smart contracts and self-sovereign identity on top of blockchain1
Investigation of application layer DDoS attacks in legacy and software-defined networks: A comprehensive review1
Fast but approximate homomorphic k-means based on masking technique1
Gossamer: weaknesses and performance1
The SAINT observatory subsystem: an open-source intelligence tool for uncovering cybersecurity threats1
A novel hybrid hunger games algorithm for intrusion detection systems based on nonlinear regression modeling1
Outsourced cheating detection for secret sharing1
TENET: a new hybrid network architecture for adversarial defense1
Two-model active learning approach for inappropriate information classification in social networks1
An effective attack scenario construction model based on identification of attack steps and stages1
Intelligent cybersecurity approach for data protection in cloud computing based Internet of Things1
Evaluating the impact of filter-based feature selection in intrusion detection systems1
Secure access privilege delegation using attribute-based encryption1
Blockchain and smart contract architecture for notaries services under civil law: a Brazilian experience1
Establishing and validating secured keys for IoT devices: using P3 connection model on a cloud-based architecture1
Cyber threat assessment and management for securing healthcare ecosystems using natural language processing1
HTTPScout: A Machine Learning based Countermeasure for HTTP Flood Attacks in SDN1
Evading malware classifiers using RL agent with action-mask1
A quantitative framework for security assurance evaluation and selection of cloud services: a case study1
Information security and privacy challenges of cloud computing for government adoption: a systematic review1
Blockchain-based data integrity framework for Internet of Things1
Defense against membership inference attack in graph neural networks through graph perturbation1
SFCGDroid: android malware detection based on sensitive function call graph1
Anonymity in traceable cloud data broadcast system with simultaneous individual messaging1
Flexible adversary disclosure risk measure for identity and attribute disclosure attacks1
IntentAuth: Securing Android’s Intent-based inter-process communication1
An efficient user authentication and key agreement scheme for wireless sensor networks using physically unclonable function1
Trends in publishing blockchain surveys: a bibliometric perspective1
Authentication-enabled attribute-based access control for smart homes1
Real-time detection of deception attacks in cyber-physical systems1
A simple and secure user authentication scheme using Map Street View with usability analysis based on ISO/IEC 250221
Detection, characterization, and profiling DoH Malicious traffic using statistical pattern recognition1
A survey on run-time packers and mitigation techniques1
Risk model development for information security in organization environment based on business perspectives1
A typology of secure multicast communication over 5 G/6 G networks1
A security protocol for D2D communications in 5G networks using elliptic curve cryptography1
0.077691078186035