International Journal of Information Security

Papers
(The median citation count of International Journal of Information Security is 2. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2020-11-01 to 2024-11-01.)
ArticleCitations
Robotics cyber security: vulnerabilities, attacks, countermeasures, and recommendations106
Survey on image encryption techniques using chaotic maps in spatial, transform and spatiotemporal domains78
MAPAS: a practical deep learning-based android malware detection system53
Public key versus symmetric key cryptography in client–server authentication protocols30
A review on fake news detection 3T’s: typology, time of detection, taxonomies30
A systematic literature review for network intrusion detection system (IDS)29
Deep SARSA-based reinforcement learning approach for anomaly network intrusion detection system25
Applying NLP techniques to malware detection in a practical environment25
Automatic analysis of attack graphs for risk mitigation and prioritization on large-scale and complex networks in Industry 4.024
DAPP: automatic detection and analysis of prototype pollution vulnerability in Node.js modules22
Intelligent and behavioral-based detection of malware in IoT spectrum sensors20
Classifying resilience approaches for protecting smart grids against cyber threats20
Securing MQTT protocol for IoT environment using IDS based on ensemble learning17
A content-based deep intrusion detection system17
Cyber insurance: state of the art, trends and future directions14
Privacy in targeted advertising on mobile devices: a survey13
An efficient intrusion detection system for MQTT-IoT using enhanced chaotic salp swarm algorithm and LightGBM13
Highly private blockchain-based management system for digital COVID-19 certificates13
LASSI: a lightweight authenticated key agreement protocol for fog-enabled IoT deployment13
Attribute-based encryption and sticky policies for data access control in a smart home scenario: a comparison on networked smart object middleware12
Security analysis on “Three-factor authentication protocol using physical unclonable function for IoV”12
Cyber risk management for autonomous passenger ships using threat-informed defense-in-depth12
From zero-shot machine learning to zero-day attack detection12
BLoCNet: a hybrid, dataset-independent intrusion detection system using deep learning12
A systematic literature review on wearable health data publishing under differential privacy12
Privacy preserving data sharing and analysis for edge-based architectures12
A novel approach for detection of APT malware using multi-dimensional hybrid Bayesian belief network11
Scalable, password-based and threshold authentication for smart homes11
Design and implementation of a new lightweight chaos-based cryptosystem to secure IoT communications11
Browser-in-the-Middle (BitM) attack11
Thresholdizing HashEdDSA: MPC to the Rescue10
How education level influences internet security knowledge, behaviour, and attitude: a comparison among undergraduates, postgraduates and working graduates10
DEALER: decentralized incentives for threat intelligence reporting and exchange10
CT-GCN: a phishing identification model for blockchain cryptocurrency transactions10
Insider attack mitigation in a smart metering infrastructure using reputation score and blockchain technology10
Revisiting QUIC attacks: a comprehensive review on QUIC security and a hands-on study10
On the detection of lateral movement through supervised machine learning and an open-source tool to create turnkey datasets from Sysmon logs9
Machine learning approach to vulnerability detection in OAuth 2.0 authentication and authorization flow9
Intrusion detection system over real-time data traffic using machine learning methods with feature selection approaches9
Extending access control in AWS IoT through event-driven functions: an experimental evaluation using a smart lock system9
A study of machine learning-based models for detection, control, and mitigation of cyberbullying in online social media9
PatrIoT: practical and agile threat research for IoT9
Effective network intrusion detection using stacking-based ensemble approach9
Dependency-based security risk assessment for cyber-physical systems9
Continuous improvement process (CIP)-based privacy-preserving framework for smart connected toys8
A full privacy-preserving distributed batch-based certificate-less aggregate signature authentication scheme for healthcare wearable wireless medical sensor networks (HWMSNs)8
Password-authenticated searchable encryption8
Novel trust-aware intrusion detection and prevention system for 5G MANET–Cloud8
A comprehensive survey of phishing: mediums, intended targets, attack and defence techniques and a novel taxonomy8
PSO + FL = PAASO: particle swarm optimization + federated learning = privacy-aware agent swarm optimization8
Challenges of post-quantum digital signing in real-world applications: a survey8
Generative AI for pentesting: the good, the bad, the ugly8
Accountable privacy preserving attribute-based access control for cloud services enforced using blockchain8
Energy-efficient trust-aware secured neuro-fuzzy clustering with sparrow search optimization in wireless sensor network8
A survey on IoT application layer protocols, security challenges, and the role of explainable AI in IoT (XAIoT)7
A context-centered methodology for IoT forensic investigations7
An intrusion detection approach based on incremental long short-term memory7
Malicious code detection in android: the role of sequence characteristics and disassembling methods7
A defensive framework for deepfake detection under adversarial settings using temporal and spatial features7
A voting gray wolf optimizer-based ensemble learning models for intrusion detection in the Internet of Things7
Evaluating card-based protocols in terms of execution time7
P2ADF: a privacy-preserving attack detection framework in fog-IoT environment7
Cyber range design framework for cyber security education and training7
Systematic review of SIEM technology: SIEM-SC birth7
ISM-AC: an immune security model based on alert correlation and software-defined networking7
A blockchain-enabled collaborative intrusion detection framework for SDN-assisted cyber-physical systems6
A risk-level assessment system based on the STRIDE/DREAD model for digital data marketplaces6
A deep learner model for multi-language webshell detection6
Privacy-preserving continuous authentication using behavioral biometrics6
Adversarial security mitigations of mmWave beamforming prediction models using defensive distillation and adversarial retraining6
An efficient privacy-preserving pay-by-phone system for regulated parking areas6
AiCEF: an AI-assisted cyber exercise content generation framework using named entity recognition6
Secure cloud-based mobile apps: attack taxonomy, requirements, mechanisms, tests and automation6
Mitigating insider threat by profiling users based on mouse usage pattern: ensemble learning and frequency domain analysis6
An autoML network traffic analyzer for cyber threat detection6
Cyber–physical risk assessment for false data injection attacks considering moving target defences6
INCHAIN: a cyber insurance architecture with smart contracts and self-sovereign identity on top of blockchain5
Phish-Sight: a new approach for phishing detection using dominant colors on web pages and machine learning5
A survey on interest packet flooding attacks and its countermeasures in named data networking5
A technical characterization of APTs by leveraging public resources5
Anomalous behavior detection-based approach for authenticating smart home system users5
Attention: there is an inconsistency between android permissions and application metadata!5
Tracing the evolution of cyber resilience: a historical and conceptual review5
DNS exfiltration detection in the presence of adversarial attacks and modified exfiltrator behaviour5
Cyber threat assessment and management for securing healthcare ecosystems using natural language processing5
Malicious website identification using design attribute learning5
A survey on analyzing encrypted network traffic of mobile devices5
Bu-Dash: a universal and dynamic graphical password scheme (extended version)5
OCPP in the spotlight: threats and countermeasures for electric vehicle charging infrastructures 4.05
Analyzing and comparing the security of self-sovereign identity management systems through threat modeling5
Federated learning-based intrusion detection system for Internet of Things5
Security beyond cybersecurity: side-channel attacks against non-cyber systems and their countermeasures5
The Agent Web Model: modeling web hacking for reinforcement learning5
Cybersecurity challenges in IoT-based smart renewable energy5
Defeating traffic analysis via differential privacy: a case study on streaming traffic4
PPAM-mIoMT: a privacy-preserving authentication with device verification for securing healthcare systems in 5G networks4
SealFSv2: combining storage-based and ratcheting for tamper-evident logging4
A comprehensive Blockchain-oriented secure framework for SDN/Fog-based IoUT4
Security-enhanced firmware management scheme for smart home IoT devices using distributed ledger technologies4
LDES: detector design for version number attack detection using linear temporal logic based on discrete event system4
Mobile botnet detection: a comprehensive survey4
IoT-oriented high-efficient anti-malware hardware focusing on time series metadata extractable from inside a processor core4
Improving spam email classification accuracy using ensemble techniques: a stacking approach4
Pragmatic authenticated key agreement for IEEE Std 802.15.64
Privacy and safety improvement of VANET data via a safety-related privacy scheme4
A decentralized honeypot for IoT Protocols based on Android devices4
Blockchain-based multi-diagnosis deep learning application for various diseases classification4
A novel two-level secure access control approach for blockchain platform in healthcare4
A new smart smudge attack using CNN4
A systematic review of privacy techniques in recommendation systems4
Authenticated logarithmic-order supersingular isogeny group key exchange4
Detection of adversarial attacks based on differences in image entropy4
Forensic investigation of the dark web on the Tor network: pathway toward the surface web4
MLSTL-WSN: machine learning-based intrusion detection using SMOTETomek in WSNs4
Coin-based Secure Computations4
Network intrusion detection and mitigation in SDN using deep learning models4
Random resampling algorithms for addressing the imbalanced dataset classes in insider threat detection4
A multi-objective cost–benefit optimization algorithm for network hardening4
Automated benchmark network diversification for realistic attack simulation with application to moving target defense4
Multi-cloud applications: data and code fragmentation for improved security4
User identification using deep learning and human activity mobile sensor data4
Enhanced models for privacy and utility in continuous-time diffusion networks4
DFTMicroagg: a dual-level anonymization algorithm for smart grid data4
From scattered data to actionable knowledge: flexible cyber security reporting in the military domain4
A Digital Asset Inheritance Model to Convey Online Persona Posthumously3
A novel frame switching model based on virtual MAC in SDN3
An anonymous and unlinkable electronic toll collection system3
SFCGDroid: android malware detection based on sensitive function call graph3
Information security and privacy challenges of cloud computing for government adoption: a systematic review3
Attribute disclosure risk for k-anonymity: the case of numerical data3
A first look at references from the dark to the surface web world: a case study in Tor3
Federated transfer learning for attack detection for Internet of Medical Things3
SDN as a defence mechanism: a comprehensive survey3
Defense against membership inference attack in graph neural networks through graph perturbation3
A survey of anomaly detection methods for power grids3
Maintaining the level of operational effectiveness of a CSOC under adverse conditions3
RWArmor: a static-informed dynamic analysis approach for early detection of cryptographic windows ransomware3
A unit-based symbolic execution method for detecting memory corruption vulnerabilities in executable codes3
Recommendation of secure group communication schemes using multi-objective optimization3
Hate speech, toxicity detection in online social media: a recent survey of state of the art and opportunities3
ANS-based compression and encryption with 128-bit security3
Adversarial attack detection framework based on optimized weighted conditional stepwise adversarial network3
HTTPScout: A Machine Learning based Countermeasure for HTTP Flood Attacks in SDN3
Early web application attack detection using network traffic analysis3
A personalized learning theory-based cyber-security training exercise3
Causal effect analysis-based intrusion detection system for IoT applications3
Error reduction of SRAM-based physically unclonable function for chip authentication3
Trends in publishing blockchain surveys: a bibliometric perspective3
Evaluating the impact of filter-based feature selection in intrusion detection systems3
A systematic overview on methods to protect sensitive data provided for various analyses3
Modeling reporting delays in cyber incidents: an industry-level comparison3
A novel malicious remote administration tool using stealth and self-defense techniques3
Octopus: privacy preserving peer-to-peer transactions system with InterPlanetary file system (IPFS)3
An end-to-end intrusion detection system with IoT dataset using deep learning with unsupervised feature extraction2
Malicious uses of blockchains by malware: from the analysis to Smart-Zephyrus2
A review on graph-based approaches for network security monitoring and botnet detection2
Evaluating differentially private decision tree model over model inversion attack2
Cashing out crypto: state of practice in ransom payments2
A novel hybrid hunger games algorithm for intrusion detection systems based on nonlinear regression modeling2
Maritime decision-makers and cyber security: deck officers’ perception of cyber risks towards IT and OT systems2
BitCracker: BitLocker meets GPUs2
Efficient searchable symmetric encryption supporting range queries2
An integrated deep learning model for Ethereum smart contract vulnerability detection2
Estimating vulnerability metrics with word embedding and multiclass classification methods2
Algorithm substitution attacks against receivers2
An ensemble approach-based intrusion detection system utilizing ISHO-HBA and SE-ResNet1522
Security analysis and improvement of a privacy-preserving authentication scheme in VANET2
Two-stage advanced persistent threat (APT) attack on an IEC 61850 power grid substation2
SmartiPhish: a reinforcement learning-based intelligent anti-phishing solution to detect spoofed website attacks2
Yet another cybersecurity risk assessment framework2
Blockchain-based BATMAN protocol using mobile ad hoc network (MANET) with an ensemble algorithm2
ThunderSecure: deploying real-time intrusion detection for 100G research networks by leveraging stream-based features and one-class classification network2
Olympus: a GDPR compliant blockchain system2
Protection of centralized SDN control plane from high-rate Packet-In messages2
Radio frequency fingerprinting techniques for device identification: a survey2
The rise of “security and privacy”: bibliometric analysis of computer privacy research2
Blockchain and smart contract architecture for notaries services under civil law: a Brazilian experience2
Are chrome extensions compliant with the spirit of least privilege?2
Tracking adoption of revocation and cryptographic features in X.509 certificates2
Investigation of application layer DDoS attacks in legacy and software-defined networks: A comprehensive review2
Mastering data privacy: leveraging K-anonymity for robust health data sharing2
Trustworthy machine learning in the context of security and privacy2
A survey on run-time packers and mitigation techniques2
An efficient user authentication and key agreement scheme for wireless sensor networks using physically unclonable function2
A semantic-aware log generation method for network activities2
Establishing and validating secured keys for IoT devices: using P3 connection model on a cloud-based architecture2
Evaluation of neural networks defenses and attacks using NDCG and reciprocal rank metrics2
BAPRP: a machine learning approach to blackhole attacks prevention routing protocol in vehicular Ad Hoc networks2
Generating ICS vulnerability playbooks with open standards2
A security protocol for D2D communications in 5G networks using elliptic curve cryptography2
Fast but approximate homomorphic k-means based on masking technique2
Enabling isolation and recovery in PLC redundancy framework of metro train systems2
An interpretability security framework for intelligent decision support systems based on saliency map2
A systematic mapping study on security for systems of systems2
Web access monitoring mechanism via Android WebView for threat analysis2
Securing the controller area network with covert voltage channels2
0.03144097328186