International Journal of Information Security

Papers
(The median citation count of International Journal of Information Security is 1. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2021-02-01 to 2025-02-01.)
ArticleCitations
Enhancing security in Fiat–Shamir transformation-based non-interactive zero-knowledge protocols for IoT authentication106
Browser-in-the-Middle (BitM) attack85
Flexible adversary disclosure risk measure for identity and attribute disclosure attacks53
Inflect-text: a novel mechanism to evade neural text classifiers by leveraging word inflectional perturbations44
The SAINT observatory subsystem: an open-source intelligence tool for uncovering cybersecurity threats30
Privacy-preserving continuous authentication using behavioral biometrics30
Lib2Desc: automatic generation of security-centric Android app descriptions using third-party libraries25
Cyber risk management for autonomous passenger ships using threat-informed defense-in-depth25
Automatic analysis of attack graphs for risk mitigation and prioritization on large-scale and complex networks in Industry 4.024
Highly private blockchain-based management system for digital COVID-19 certificates22
Pepal: Penalizing multimedia breaches and partial leakages20
An SSH predictive model using machine learning with web proxy session logs20
Analysis of OSPU security effect and data assembly verification under semi-network OS architecture17
cFEM: a cluster based feature extraction method for network intrusion detection17
C2-Eye: framework for detecting command and control (C2) connection of supply chain attacks16
Expediting the design and development of secure cloud-based mobile apps13
Fast but approximate homomorphic k-means based on masking technique13
Adaptive context-aware access control for IoT environments leveraging fog computing13
Anomalous behavior detection-based approach for authenticating smart home system users13
Non-Alpha-Num: a novel architecture for generating adversarial examples for bypassing NLP-based clickbait detection mechanisms13
Generating ICS vulnerability playbooks with open standards12
Enhancing privacy protections in national identification systems: an examination of stakeholders’ knowledge, attitudes, and practices of privacy by design12
Novel mechanism for anonymous reporting and anonymous rewarding using blockchain technology12
A unit-based symbolic execution method for detecting memory corruption vulnerabilities in executable codes12
SealFSv2: combining storage-based and ratcheting for tamper-evident logging12
Protection of centralized SDN control plane from high-rate Packet-In messages12
TENET: a new hybrid network architecture for adversarial defense12
A review on fake news detection 3T’s: typology, time of detection, taxonomies12
A TCP-based covert channel with integrity check and retransmission11
Intrusion detection system over real-time data traffic using machine learning methods with feature selection approaches11
An overview of proposals towards the privacy-preserving publication of trajectory data11
XAIRF-WFP: a novel XAI-based random forest classifier for advanced email spam detection11
A comprehensive Blockchain-oriented secure framework for SDN/Fog-based IoUT10
Activity-based payments: alternative (anonymous) online payment model10
AutoPKI: public key infrastructure for IoT with automated trust transfer10
BitCracker: BitLocker meets GPUs10
Neighbor discovery protocol anomaly-based detection system using neural network algorithm10
A multi-objective cost–benefit optimization algorithm for network hardening9
Applying NLP techniques to malware detection in a practical environment9
The rise of “security and privacy”: bibliometric analysis of computer privacy research9
A content-based deep intrusion detection system9
Trends in publishing blockchain surveys: a bibliometric perspective9
Challenges of post-quantum digital signing in real-world applications: a survey9
A systematic review of graphical password methods resistant to shoulder-surfing attacks9
Feature engineering impact on position falsification attacks detection in vehicular ad-hoc network8
Privacy preserving data sharing and analysis for edge-based architectures8
Enhancing detection of malicious profiles and spam tweets with an automated honeypot framework powered by deep learning8
RAMA: a risk assessment solution for healthcare organizations8
How education level influences internet security knowledge, behaviour, and attitude: a comparison among undergraduates, postgraduates and working graduates8
An integrated deep learning model for Ethereum smart contract vulnerability detection8
Information security and privacy challenges of cloud computing for government adoption: a systematic review8
Abuse-freeness in contract signing: a blockchain-based proposal7
Blockchain-based multi-diagnosis deep learning application for various diseases classification7
De Bello Homomorphico: Investigation of the extensibility of the OpenFHE library with basic mathematical functions by means of common approaches using the example of the CKKS cryptosystem7
Enhancing security in QCA-based circuits using optimal key gate placement7
A location-updating based self-healing group key management scheme for VANETs7
Integrating AI-driven threat intelligence and forecasting in the cyber security exercise content generation lifecycle7
Selfish mining attack in blockchain: a systematic literature review7
Information-theoretic privacy-preserving user authentication7
Using machine learning to detect network intrusions in industrial control systems: a survey7
SFCGDroid: android malware detection based on sensitive function call graph6
An intrusion detection approach based on incremental long short-term memory6
Efficient arabic and english social spam detection using a transformer and 2D convolutional neural network-based deep learning filter6
Systematic review of SIEM technology: SIEM-SC birth6
A novel two-level secure access control approach for blockchain platform in healthcare6
Trust modeling in a distributed collaborative environment: application to a collaborative healthcare system6
A modular cyber security training programme for the maritime domain6
Information flow control for comparative privacy analyses6
Intelligent and behavioral-based detection of malware in IoT spectrum sensors6
A comprehensive analysis on software vulnerability detection datasets: trends, challenges, and road ahead6
AiCEF: an AI-assisted cyber exercise content generation framework using named entity recognition6
A voting gray wolf optimizer-based ensemble learning models for intrusion detection in the Internet of Things6
Cyber–physical risk assessment for false data injection attacks considering moving target defences6
A survey on analyzing encrypted network traffic of mobile devices6
Maritime cybersecurity: protecting digital seas5
Revisiting QUIC attacks: a comprehensive review on QUIC security and a hands-on study5
Exploring smooth number-based MAC algorithms for secure communication in IoT devices: a systematic literature review5
Low-impact, near real-time risk assessment for legacy IT infrastructures5
Malware classification approaches utilizing binary and text encoding of permissions5
A deep learning approach based on multi-view consensus for SQL injection detection5
Evading malware classifiers using RL agent with action-mask5
Challenges and future research directions in secure multi-party computation for resource-constrained devices and large-scale computations5
Gridchain: an investigation of privacy for the future local distribution grid5
Guiding the implementation of data privacy with microservices5
Vulnerability discovery based on source code patch commit mining: a systematic literature review5
An enhanced and verifiable lightweight authentication protocol for securing the Internet of Medical Things (IoMT) based on CP-ABE encryption5
Enhancing DevSecOps practice with Large Language Models and Security Chaos Engineering5
pbins: private bins for top-k semantic search over encrypted data using transformers5
Securing the IoT ecosystem: ASIC-based hardware realization of Ascon lightweight cipher5
PSO + FL = PAASO: particle swarm optimization + federated learning = privacy-aware agent swarm optimization5
Error reduction of SRAM-based physically unclonable function for chip authentication4
Performance analysis of capsule networks for detecting GPS spoofing attacks on unmanned aerial vehicles4
PPAM-mIoMT: a privacy-preserving authentication with device verification for securing healthcare systems in 5G networks4
Multi-party codebook distribution strategy based on secret sharing4
Perceptions of organizational responsibility for cybersecurity in Saudi Arabia: a moderated mediation analysis4
On the adoption and deployment of secure and privacy-preserving IIoT in smart manufacturing: a comprehensive guide with recent advances4
Pioneering automated vulnerability detection for smart contracts in blockchain using KEVM: Guardian ADRGAN4
Network intrusion detection and mitigation in SDN using deep learning models4
A survey on interest packet flooding attacks and its countermeasures in named data networking4
Efficient and interpretable SRU combined with TabNet for network intrusion detection in the big data environment4
A decentralized honeypot for IoT Protocols based on Android devices4
Optimization of parallel firewalls filtering rules4
BA-flag: a self-prevention mechanism of selfish mining attacks in blockchain technology4
Random resampling algorithms for addressing the imbalanced dataset classes in insider threat detection4
Email bombing attack detection and mitigation using machine learning4
Design and analysis of DDoS mitigating network architecture4
Validation and extension of two domain-specific information privacy competency models4
From frontlines to online: examining target preferences in the Russia–Ukraine conflict4
Developing non-interactive MPC with trusted hardware for enhanced security4
Security analysis on “Three-factor authentication protocol using physical unclonable function for IoV”4
Dependency-based security risk assessment for cyber-physical systems4
Cyber threat assessment and management for securing healthcare ecosystems using natural language processing4
A method for insider threat assessment by modeling the internal employee interactions4
Maritime decision-makers and cyber security: deck officers’ perception of cyber risks towards IT and OT systems4
Security assessment and improvement of smart grid NIKE protocol4
Thresholdizing HashEdDSA: MPC to the Rescue4
Fairness as a Service (FaaS): verifiable and privacy-preserving fairness auditing of machine learning systems4
A deep learner model for multi-language webshell detection3
BASPED: Blockchain assisted searchable public key encryption over outsourced data3
Gaming the system: tetromino-based covert channel and its impact on mobile security3
Cyber range design framework for cyber security education and training3
The Agent Web Model: modeling web hacking for reinforcement learning3
Deep behavioral analysis of machine learning algorithms against data poisoning3
Press play, install malware: a study of rhythm game-based malware dropping3
Balancing the act? Resampling versus imbalanced data for Wi-Fi IDS3
Privacy and safety improvement of VANET data via a safety-related privacy scheme3
PROGRESS: the sectoral approach to cyber resilience3
Locating collaborative attack targets based on physical invariants toward cyber-physical systems3
CT-GCN: a phishing identification model for blockchain cryptocurrency transactions3
RWArmor: a static-informed dynamic analysis approach for early detection of cryptographic windows ransomware3
Evaluating the merits and constraints of cryptography-steganography fusion: a systematic analysis3
Energy-efficient trust-aware secured neuro-fuzzy clustering with sparrow search optimization in wireless sensor network3
Factors influencing Swedish citizens’ willingness to provide their mobile phones to forensic examination3
The awareness of operators: a goal-directed task analysis in SOCs for critical infrastructure3
Scalable, password-based and threshold authentication for smart homes3
BAPRP: a machine learning approach to blackhole attacks prevention routing protocol in vehicular Ad Hoc networks3
Olympus: a GDPR compliant blockchain system3
A study of machine learning-based models for detection, control, and mitigation of cyberbullying in online social media3
A comprehensive approach for mitigating impersonation in online assessment: integrity policy and random authentication3
A hybrid IDS for detection and mitigation of sinkhole attack in 6LoWPAN networks3
A computationally efficient dimensionality reduction and attack classification approach for network intrusion detection3
Survey on image encryption techniques using chaotic maps in spatial, transform and spatiotemporal domains3
Retraction Note: Deep learning based network intrusion detection system: a systematic literature review and future scopes3
Survey-based analysis of cybersecurity awareness of Turkish seafarers3
A novel approach for detection of APT malware using multi-dimensional hybrid Bayesian belief network3
Ai-enabled automated common vulnerability scoring from common vulnerabilities and exposures descriptions3
Side-channel attacks and countermeasures for heart rate retrieval from ECG characterization device3
Securesdp: a novel software-defined perimeter implementation for enhanced network security and scalability2
Restricting data-leakage using fine-grained access control on OSN objects2
Business-layer client-side racer: dynamic security testing of the web application against client-side race condition in the business layer2
A survey on IoT application layer protocols, security challenges, and the role of explainable AI in IoT (XAIoT)2
A cyber defense system against phishing attacks with deep learning game theory and LSTM-CNN with African vulture optimization algorithm (AVOA)2
Secure access privilege delegation using attribute-based encryption2
An efficient user authentication and key agreement scheme for wireless sensor networks using physically unclonable function2
DFTMicroagg: a dual-level anonymization algorithm for smart grid data2
Phish-Sight: a new approach for phishing detection using dominant colors on web pages and machine learning2
Bluetooth security analysis of general and intimate health IoT devices and apps: the case of FemTech2
A novel frame switching model based on virtual MAC in SDN2
Publisher Correction: PPAM-mIoMT: a privacy-preserving authentication with device verification for securing healthcare systems in 5G networks2
An exploratory study on domain knowledge infusion in deep learning for automated threat defense2
BLoCNet: a hybrid, dataset-independent intrusion detection system using deep learning2
MEDICALHARM: A threat modeling designed for modern medical devices and a comprehensive study on effectiveness, user satisfaction, and security perspectives2
Topology-hiding garbled circuits without universal circuits2
Acnn: arbitrary trace attacks based on leakage area detection2
A comprehensive survey of phishing: mediums, intended targets, attack and defence techniques and a novel taxonomy2
Model-Agnostic Utility-Preserving Biometric Information Anonymization2
Maintaining the level of operational effectiveness of a CSOC under adverse conditions2
Optimized common features selection and deep-autoencoder (OCFSDA) for lightweight intrusion detection in Internet of things2
DAPP: automatic detection and analysis of prototype pollution vulnerability in Node.js modules2
An anonymous and unlinkable electronic toll collection system2
Blockchain-based BATMAN protocol using mobile ad hoc network (MANET) with an ensemble algorithm2
Narrow privacy and desynchronization in Vaudenay’s RFID model2
Dynamic authentication for intelligent sensor clouds in the Internet of Things2
Short- versus long-term performance of detection models for obfuscated MSOffice-embedded malware2
Defeating traffic analysis via differential privacy: a case study on streaming traffic2
A typology of secure multicast communication over 5 G/6 G networks2
Unmasking the common traits: an ensemble approach for effective malware detection2
A personalized learning theory-based cyber-security training exercise2
Password guessers under a microscope: an in-depth analysis to inform deployments2
A defensive framework for deepfake detection under adversarial settings using temporal and spatial features2
Improving spam email classification accuracy using ensemble techniques: a stacking approach2
A distributed and cooperative signature-based intrusion detection system framework for multi-channel man-in-the-middle attacks against protected Wi-Fi networks2
Causal effect analysis-based intrusion detection system for IoT applications2
Adversarial robustness of deep reinforcement learning-based intrusion detection2
Securing the remote office: reducing cyber risks to remote working through regular security awareness education campaigns2
DNS exfiltration detection in the presence of adversarial attacks and modified exfiltrator behaviour1
IoTvulCode: AI-enabled vulnerability detection in software products designed for IoT applications1
Security bug reports classification using fasttext1
A review on graph-based approaches for network security monitoring and botnet detection1
Tracing the evolution of cyber resilience: a historical and conceptual review1
From scattered data to actionable knowledge: flexible cyber security reporting in the military domain1
Early web application attack detection using network traffic analysis1
An autoML network traffic analyzer for cyber threat detection1
Mastering data privacy: leveraging K-anonymity for robust health data sharing1
Correction: A full privacy-preserving distributed batch-based certificate-less aggregate signature authentication scheme for healthcare wearable wireless medical sensor networks (HWMSNs)1
Anonymity and everlasting privacy in electronic voting1
Improving traceability in e-governance file-sharing systems: the Moroccan justice system as a use case1
Security analysis and improvement of a privacy-preserving authentication scheme in VANET1
Classifying resilience approaches for protecting smart grids against cyber threats1
Low complexity decompression method for FPGA bitstreams1
Analyzing and comparing the security of self-sovereign identity management systems through threat modeling1
Accountable privacy preserving attribute-based access control for cloud services enforced using blockchain1
Establishing and validating secured keys for IoT devices: using P3 connection model on a cloud-based architecture1
Trustworthy machine learning in the context of security and privacy1
Cashing out crypto: state of practice in ransom payments1
On the effectiveness of adversarial samples against ensemble learning-based windows PE malware detectors1
Detection, characterization, and profiling DoH Malicious traffic using statistical pattern recognition1
A survey of anomaly detection methods for power grids1
Enhancing phishing email detection with stylometric features and classifier stacking1
A study on privacy and security aspects of personalised apps1
An ensemble approach-based intrusion detection system utilizing ISHO-HBA and SE-ResNet1521
Coin-based Secure Computations1
A cross-setting study of user unlocking behaviour in a graphical authentication scheme: a case study on android Pattern Unlock1
SmartiPhish: a reinforcement learning-based intelligent anti-phishing solution to detect spoofed website attacks1
Track for surveys1
HOMOGRAPH: a novel textual adversarial attack architecture to unmask the susceptibility of linguistic acceptability classifiers1
A Digital Asset Inheritance Model to Convey Online Persona Posthumously1
Adaptive hyperparameter optimization for black-box adversarial attack1
Large language models based vulnerability detection: How does it enhance performance?1
Enhancing attack resilience of cyber-physical systems through state dependency graph models1
Privacy in targeted advertising on mobile devices: a survey1
Federated learning-based intrusion detection system for Internet of Things1
MLSTL-WSN: machine learning-based intrusion detection using SMOTETomek in WSNs1
A survey and characterization of Close Access Cyberspace Operations1
An intrinsic evaluator for embedding methods in malicious URL detection1
MLChain: a privacy-preserving model learning framework using blockchain1
Aldp-fl: an adaptive local differential privacy-based federated learning mechanism for IoT1
Start thinking in graphs: using graphs to address critical attack paths in a Microsoft cloud tenant1
Design and implementation of a new lightweight chaos-based cryptosystem to secure IoT communications1
Public key versus symmetric key cryptography in client–server authentication protocols1
A full privacy-preserving distributed batch-based certificate-less aggregate signature authentication scheme for healthcare wearable wireless medical sensor networks (HWMSNs)1
Efficient verifiable computation over quotient polynomial rings1
An end-to-end intrusion detection system with IoT dataset using deep learning with unsupervised feature extraction1
GaTeBaSep: game theory-based security protocol against ARP spoofing attacks in software-defined networks1
Pragmatic authenticated key agreement for IEEE Std 802.15.61
IoT-oriented high-efficient anti-malware hardware focusing on time series metadata extractable from inside a processor core1
A perspective–retrospective analysis of diversity in signature-based open-source network intrusion detection systems1
An improved and efficient coercion-resistant measure for electronic voting system1
Forensic investigation of the dark web on the Tor network: pathway toward the surface web1
Transformer or Autoencoder? Who is the ultimate adversary for attack detectors?1
0.13168883323669