International Journal of Information Security

Papers
(The median citation count of International Journal of Information Security is 2. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2021-05-01 to 2025-05-01.)
ArticleCitations
BitCracker: BitLocker meets GPUs111
Fast but approximate homomorphic k-means based on masking technique82
The rise of “security and privacy”: bibliometric analysis of computer privacy research68
Feature engineering impact on position falsification attacks detection in vehicular ad-hoc network46
An intrusion detection approach based on incremental long short-term memory44
AutoPKI: public key infrastructure for IoT with automated trust transfer38
Using machine learning to detect network intrusions in industrial control systems: a survey37
Outlier-oriented poisoning attack: a grey-box approach to disturb decision boundaries by perturbing outliers in multiclass learning28
Anomalous behavior detection-based approach for authenticating smart home system users28
Systematic review of SIEM technology: SIEM-SC birth27
A content-based deep intrusion detection system26
Efficient arabic and english social spam detection using a transformer and 2D convolutional neural network-based deep learning filter24
Random resampling algorithms for addressing the imbalanced dataset classes in insider threat detection23
Malware classification approaches utilizing binary and text encoding of permissions23
BLoCNet: a hybrid, dataset-independent intrusion detection system using deep learning23
Balancing usability, user experience, security and privacy in XR systems: a multidimensional approach23
A comprehensive approach for mitigating impersonation in online assessment: integrity policy and random authentication20
Fairness as a Service (FaaS): verifiable and privacy-preserving fairness auditing of machine learning systems19
Optimization of parallel firewalls filtering rules19
Xai-driven black-box adversarial attacks on network intrusion detectors19
Survey on image encryption techniques using chaotic maps in spatial, transform and spatiotemporal domains18
Automated broken object-level authorization attack detection in REST APIs through OpenAPI to colored petri nets transformation18
Detection, characterization, and profiling DoH Malicious traffic using statistical pattern recognition17
Model-Agnostic Utility-Preserving Biometric Information Anonymization17
A cyber defense system against phishing attacks with deep learning game theory and LSTM-CNN with African vulture optimization algorithm (AVOA)17
Tracing the evolution of cyber resilience: a historical and conceptual review17
Unmasking the common traits: an ensemble approach for effective malware detection16
Enhancing phishing email detection with stylometric features and classifier stacking16
Adversarial robustness of deep reinforcement learning-based intrusion detection15
Improving spam email classification accuracy using ensemble techniques: a stacking approach15
MEDICALHARM: A threat modeling designed for modern medical devices and a comprehensive study on effectiveness, user satisfaction, and security perspectives15
Restricting data-leakage using fine-grained access control on OSN objects15
Phish-Sight: a new approach for phishing detection using dominant colors on web pages and machine learning15
A survey of anomaly detection methods for power grids15
Privacy information propagation in online social networks - a case study based on Weibo data14
Secure outsourcing of manufacturing compliance checks14
“Animation” URL in NFT marketplaces considered harmful for privacy14
Acnn: arbitrary trace attacks based on leakage area detection14
GaTeBaSep: game theory-based security protocol against ARP spoofing attacks in software-defined networks14
A systematic mapping study on security for systems of systems14
A perspective–retrospective analysis of diversity in signature-based open-source network intrusion detection systems14
Business process models and simulation to enable GDPR compliance13
Unmasking SDN flow table saturation: fingerprinting, attacks and defenses13
Authentication in Internet of Things, protocols, attacks, and open issues: a systematic literature review13
Efficient authentication scheme for heterogeneous signcryption with cryptographic reverse firewalls for VANETs12
Attribute inference privacy protection for pre-trained models12
Semi-supervised approach for detecting malicious domains in TLDs in their first query12
Certified unlearning for a trustworthy machine learning-based access control administration12
Analyzing shared keys in X.509 certificates with domain ownership11
Generating adversarial examples with collaborative generative models11
Spatial de-correlation of generated keys from wireless channels using adversarial deep learning11
Deceiving supervised machine learning models via adversarial data poisoning attacks: a case study with USB keyboards11
A systematic literature review on wearable health data publishing under differential privacy11
RLET: a lightweight model for ubiquitous multi-class intrusion detection in sustainable and secured smart environment11
Estimating vulnerability metrics with word embedding and multiclass classification methods11
Developers’ mindset on self-adaptive privacy and its requirements for cloud computing environments11
Blockchain-based data integrity framework for Internet of Things11
Exploring the potential of deep learning and machine learning techniques for randomness analysis to enhance security on IoT11
Generative AI for pentesting: the good, the bad, the ugly11
Cyber-security gamification in federation of cyber ranges: design, implementation, and evaluation10
A generic framework for blockchain-assisted on-chain auditing for off-chain storage10
Multi-cloud applications: data and code fragmentation for improved security10
Adversarial attack detection framework based on optimized weighted conditional stepwise adversarial network10
A fog-based anonymous authentication scheme with location privacy for wireless body area network with FPGA implementation10
WEFT: a consistent and tamper-proof methodology for acquisition of automatically verifiable forensic web evidence10
DevSecOps practices and tools10
Adversarial attacks against mouse- and keyboard-based biometric authentication: black-box versus domain-specific techniques10
Malicious uses of blockchains by malware: from the analysis to Smart-Zephyrus9
Security beyond cybersecurity: side-channel attacks against non-cyber systems and their countermeasures9
Comprehensive review on machine learning and deep learning techniques for malware detection in android and IoT devices9
Trust attack prevention based on Spark-blockchain in social IoT: a survey9
Two-stage advanced persistent threat (APT) attack on an IEC 61850 power grid substation9
A first look at references from the dark to the surface web world: a case study in Tor9
A systematic overview on methods to protect sensitive data provided for various analyses9
International journal of information security: a bibliometric study, 2007–20239
Multi-user covert communication in power internet of things networks9
Toward a unified and secure approach for extraction of forensic digital evidence from an IoT device9
Revisiting QUIC attacks: a comprehensive review on QUIC security and a hands-on study8
A unit-based symbolic execution method for detecting memory corruption vulnerabilities in executable codes8
Vulnerability discovery based on source code patch commit mining: a systematic literature review8
Analysis of OSPU security effect and data assembly verification under semi-network OS architecture8
Deep behavioral analysis of machine learning algorithms against data poisoning8
A comprehensive analysis of cryptocurrency breaches at endpoint8
Generating ICS vulnerability playbooks with open standards8
Non-Alpha-Num: a novel architecture for generating adversarial examples for bypassing NLP-based clickbait detection mechanisms8
ANS-based compression and encryption with 128-bit security8
TENET: a new hybrid network architecture for adversarial defense8
Retraction Note: Deep learning based network intrusion detection system: a systematic literature review and future scopes8
Protection of centralized SDN control plane from high-rate Packet-In messages8
Balancing the act? Resampling versus imbalanced data for Wi-Fi IDS8
Challenges of post-quantum digital signing in real-world applications: a survey8
Novel mechanism for anonymous reporting and anonymous rewarding using blockchain technology8
Securing the IoT ecosystem: ASIC-based hardware realization of Ascon lightweight cipher8
A comprehensive Blockchain-oriented secure framework for SDN/Fog-based IoUT8
Abuse-freeness in contract signing: a blockchain-based proposal8
Performance analysis of capsule networks for detecting GPS spoofing attacks on unmanned aerial vehicles8
Cyber–physical risk assessment for false data injection attacks considering moving target defences8
Selfish mining attack in blockchain: a systematic literature review8
An overview of proposals towards the privacy-preserving publication of trajectory data8
Pioneering automated vulnerability detection for smart contracts in blockchain using KEVM: Guardian ADRGAN7
Factors influencing Swedish citizens’ willingness to provide their mobile phones to forensic examination7
Federated learning for misbehaviour detection with variational autoencoders and Gaussian mixture models7
A deep learning approach based on multi-view consensus for SQL injection detection7
Large language models for software vulnerability detection: a guide for researchers on models, methods, techniques, datasets, and metrics7
A computationally efficient dimensionality reduction and attack classification approach for network intrusion detection7
Enhancing DevSecOps practice with Large Language Models and Security Chaos Engineering7
Detecting malicious nodes using game theory and reinforcement learning in software-defined networks7
The Agent Web Model: modeling web hacking for reinforcement learning7
Email bombing attack detection and mitigation using machine learning7
Correction: Cryptocurrency recovery framework using pre-signed transaction7
Maritime decision-makers and cyber security: deck officers’ perception of cyber risks towards IT and OT systems7
Efficient and interpretable SRU combined with TabNet for network intrusion detection in the big data environment7
Machine learning approach to vulnerability detection in OAuth 2.0 authentication and authorization flow6
Short- versus long-term performance of detection models for obfuscated MSOffice-embedded malware6
A personalized learning theory-based cyber-security training exercise6
An end-to-end intrusion detection system with IoT dataset using deep learning with unsupervised feature extraction6
Start thinking in graphs: using graphs to address critical attack paths in a Microsoft cloud tenant6
Mobile botnet detection: a comprehensive survey6
Scalable, password-based and threshold authentication for smart homes6
Aldp-fl: an adaptive local differential privacy-based federated learning mechanism for IoT6
A comprehensive survey of phishing: mediums, intended targets, attack and defence techniques and a novel taxonomy6
Investigation of application layer DDoS attacks in legacy and software-defined networks: A comprehensive review6
From sinking to saving: MITRE ATT &CK and D3FEND frameworks for maritime cybersecurity6
Transformer or Autoencoder? Who is the ultimate adversary for attack detectors?6
SmartiPhish: a reinforcement learning-based intelligent anti-phishing solution to detect spoofed website attacks6
Federated learning-based intrusion detection system for Internet of Things6
DFTMicroagg: a dual-level anonymization algorithm for smart grid data6
Security analysis and improvement of a privacy-preserving authentication scheme in VANET6
Accessible password strength assessment method for visually challenged users5
A cluster of patterns for trusted computing5
A risk-level assessment system based on the STRIDE/DREAD model for digital data marketplaces5
From zero-shot machine learning to zero-day attack detection5
Robust password security: a genetic programming approach with imbalanced dataset handling5
Evaluating differentially private decision tree model over model inversion attack5
A dynamic C-V2X anonymous authentication and group key agreement protocol5
Integrating the edge computing paradigm into the development of IoT forensic methodologies5
A review on digital twins for power generation and distribution5
IoT device security audit tools: a comprehensive analysis and a layered architecture approach for addressing expanded security requirements5
Blockchain and smart contract architecture for notaries services under civil law: a Brazilian experience5
Blockchain-based multi-organizational cyber risk management framework for collaborative environments5
Construction of post quantum secure authenticated key agreement protocol for dew-assisted IoT systems5
RETRACTED ARTICLE: Deep learning based network intrusion detection system: a systematic literature review and future scopes5
An interpretability security framework for intelligent decision support systems based on saliency map5
How engaged are you? A forensic analysis of the Oura Ring Gen 3 application across iOS, Android, and Cloud platforms5
P2ADF: a privacy-preserving attack detection framework in fog-IoT environment5
Citizens’ engagement with cybersecurity measures in Bangladesh: a cross-sectional study5
A comprehensive review on permissions-based Android malware detection5
A blockchain-enabled collaborative intrusion detection framework for SDN-assisted cyber-physical systems5
Educational escape rooms for raising information privacy competences: An empirical validation5
Efficient searchable symmetric encryption supporting range queries5
A novel hybrid hunger games algorithm for intrusion detection systems based on nonlinear regression modeling4
On the detection of lateral movement through supervised machine learning and an open-source tool to create turnkey datasets from Sysmon logs4
Intelligent cybersecurity approach for data protection in cloud computing based Internet of Things4
An SSH predictive model using machine learning with web proxy session logs4
A review on fake news detection 3T’s: typology, time of detection, taxonomies4
Human factors in cybersecurity: an interdisciplinary review and framework proposal4
A TCP-based covert channel with integrity check and retransmission4
Evaluating the impact of filter-based feature selection in intrusion detection systems4
Detecting unknown vulnerabilities in smart contracts with the CNN-BiLSTM model4
Challenges and future research directions in secure multi-party computation for resource-constrained devices and large-scale computations4
Activity-based payments: alternative (anonymous) online payment model4
Adaptive context-aware access control for IoT environments leveraging fog computing4
Highly private blockchain-based management system for digital COVID-19 certificates4
Modeling reporting delays in cyber incidents: an industry-level comparison4
Adversarial security mitigations of mmWave beamforming prediction models using defensive distillation and adversarial retraining4
A review of time-series analysis for cyber security analytics: from intrusion detection to attack prediction4
SealFSv2: combining storage-based and ratcheting for tamper-evident logging4
Neighbor discovery protocol anomaly-based detection system using neural network algorithm4
A multi-objective cost–benefit optimization algorithm for network hardening4
Privacy and safety improvement of VANET data via a safety-related privacy scheme3
Malicious code detection in android: the role of sequence characteristics and disassembling methods3
Beyond the code: analyzing OSS developers security awareness and practices3
A survey on IoT application layer protocols, security challenges, and the role of explainable AI in IoT (XAIoT)3
USB-GATE: USB-based GAN-augmented transformer reinforced defense framework for adversarial keystroke injection attacks3
A cross-setting study of user unlocking behaviour in a graphical authentication scheme: a case study on android Pattern Unlock3
Brave-sdn: blockchain-reliant authentication for versatile east–west bound in distributed SDNs3
A novel frame switching model based on virtual MAC in SDN3
Dependency-based security risk assessment for cyber-physical systems3
Guiding the implementation of data privacy with microservices3
Publisher Correction: PPAM-mIoMT: a privacy-preserving authentication with device verification for securing healthcare systems in 5G networks3
Blockchain-based multi-diagnosis deep learning application for various diseases classification3
Causal effect analysis-based intrusion detection system for IoT applications3
A review on graph-based approaches for network security monitoring and botnet detection3
Detection of adversarial attacks based on differences in image entropy3
Accountable privacy preserving attribute-based access control for cloud services enforced using blockchain3
A Digital Asset Inheritance Model to Convey Online Persona Posthumously3
Octopus: privacy preserving peer-to-peer transactions system with InterPlanetary file system (IPFS)3
Establishing and validating secured keys for IoT devices: using P3 connection model on a cloud-based architecture3
Energy-efficient trust-aware secured neuro-fuzzy clustering with sparrow search optimization in wireless sensor network3
BASPED: Blockchain assisted searchable public key encryption over outsourced data3
Side-channel attacks and countermeasures for heart rate retrieval from ECG characterization device3
A survey and characterization of Close Access Cyberspace Operations3
Optimized common features selection and deep-autoencoder (OCFSDA) for lightweight intrusion detection in Internet of things3
A full privacy-preserving distributed batch-based certificate-less aggregate signature authentication scheme for healthcare wearable wireless medical sensor networks (HWMSNs)3
An online intrusion detection method for industrial control systems based on extended belief rule base3
A typology of secure multicast communication over 5 G/6 G networks3
Secure multi-party computation with legally-enforceable fairness3
Business-layer client-side racer: dynamic security testing of the web application against client-side race condition in the business layer3
Security bug reports classification using fasttext3
Error reduction of SRAM-based physically unclonable function for chip authentication3
Evading malware classifiers using RL agent with action-mask3
From frontlines to online: examining target preferences in the Russia–Ukraine conflict3
Swarm-intelligence for the modern ICT ecosystems2
A voting gray wolf optimizer-based ensemble learning models for intrusion detection in the Internet of Things2
Intrusion detection for power grid: a review2
Secure cloud-based mobile apps: attack taxonomy, requirements, mechanisms, tests and automation2
RADS: a real-time anomaly detection model for software-defined networks using machine learning2
MRS-PFIDS: federated learning driven detection of network intrusions in maritime radar systems2
AIHGAT: A novel method of malware detection and homology analysis using assembly instruction heterogeneous graph2
A simple and secure user authentication scheme using Map Street View with usability analysis based on ISO/IEC 250222
Filter aggregation for DDoS prevention systems: hardware perspective2
Distributed access control for information-centric networking architectures using verifiable credentials2
LDES: detector design for version number attack detection using linear temporal logic based on discrete event system2
Early mitigation of CPU-optimized ransomware using monitoring encryption instructions2
A comprehensive analysis on software vulnerability detection datasets: trends, challenges, and road ahead2
Flexible adversary disclosure risk measure for identity and attribute disclosure attacks2
A context-aware on-board intrusion detection system for smart vehicles2
Extending access control in AWS IoT through event-driven functions: an experimental evaluation using a smart lock system2
Malicious website identification using design attribute learning2
MAPAS: a practical deep learning-based android malware detection system2
Correction: Real-time detection of deception attacks in cyber-physical systems2
Radio frequency fingerprinting techniques for device identification: a survey2
How do gender and age similarities with a potential social engineer influence one’s trust and willingness to take security risks?2
A novel malicious remote administration tool using stealth and self-defense techniques2
Data space randomization for securing cyber-physical systems2
Trust management in the internet of vehicles: a systematic literature review of blockchain integration2
BLISS: blockchain-based integrated security system for internet of things (IoT) applications2
Enhancing unsupervised anomaly-based cyberattacks detection in smart homes through hyperparameter optimization2
Lib2Desc: automatic generation of security-centric Android app descriptions using third-party libraries2
Evaluation of neural networks defenses and attacks using NDCG and reciprocal rank metrics2
Expediting the design and development of secure cloud-based mobile apps2
Bu-Dash: a universal and dynamic graphical password scheme (extended version)2
Automated benchmark network diversification for realistic attack simulation with application to moving target defense2
Cybersecurity training and healthcare: the AERAS approach2
MLRA-Sec: an adaptive and intelligent cyber-security-assessment model for internet of medical things (IoMT)2
TL-BILSTM IoT: transfer learning model for prediction of intrusion detection system in IoT environment2
Random forest evaluation using multi-key homomorphic encryption and lookup tables2
ISM-AC: an immune security model based on alert correlation and software-defined networking2
INCHAIN: a cyber insurance architecture with smart contracts and self-sovereign identity on top of blockchain2
Yet another cybersecurity risk assessment framework2
0.075003147125244