International Journal of Information Security

Papers
(The TQCC of International Journal of Information Security is 11. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2022-05-01 to 2026-05-01.)
ArticleCitations
BitCracker: BitLocker meets GPUs214
AutoPKI: public key infrastructure for IoT with automated trust transfer92
Verifiability for privacy-preserving computing on distributed data — a survey80
Using machine learning to detect network intrusions in industrial control systems: a survey77
The rise of “security and privacy”: bibliometric analysis of computer privacy research66
Outlier-oriented poisoning attack: a grey-box approach to disturb decision boundaries by perturbing outliers in multiclass learning63
Efficient arabic and english social spam detection using a transformer and 2D convolutional neural network-based deep learning filter58
Fast but approximate homomorphic k-means based on masking technique57
Systematic review of SIEM technology: SIEM-SC birth49
Feature engineering impact on position falsification attacks detection in vehicular ad-hoc network48
Weighted quality criteria for cyber threat intelligence: assessment and prioritisation in the MISP data model47
An intrusion detection approach based on incremental long short-term memory47
Malware classification approaches utilizing binary and text encoding of permissions45
A comprehensive approach for mitigating impersonation in online assessment: integrity policy and random authentication44
Fairness as a Service (FaaS): verifiable and privacy-preserving fairness auditing of machine learning systems44
Balancing usability, user experience, security and privacy in XR systems: a multidimensional approach44
Xai-driven black-box adversarial attacks on network intrusion detectors43
BLoCNet: a hybrid, dataset-independent intrusion detection system using deep learning42
can-sleuth: Sleuthing out the capabilities, limitations, and performance impacts of automotive intrusion detection datasets42
Automated broken object-level authorization attack detection in REST APIs through OpenAPI to colored petri nets transformation41
Adaptive trust evaluation model based on container security analysis in the Docker platform41
Random resampling algorithms for addressing the imbalanced dataset classes in insider threat detection40
A vulnerability assessment and exploitation analysis of a powerline communication HomePlug AV network adapter39
Acnn: arbitrary trace attacks based on leakage area detection38
Restricting data-leakage using fine-grained access control on OSN objects37
A perspective–retrospective analysis of diversity in signature-based open-source network intrusion detection systems36
Explainable AI based dynamic cybersecurity risk management for cyber insurability35
MEDICALHARM: A threat modeling designed for modern medical devices and a comprehensive study on effectiveness, user satisfaction, and security perspectives35
Pseudonym shuffling-driven blockchain and Autoencoder-based secure E-healthcare data management35
Unmasking the common traits: an ensemble approach for effective malware detection33
Towards enhanced cybersecurity in industrial control systems: a systematic review of context-based modeling, digital twins, and machine learning approaches33
Model-Agnostic Utility-Preserving Biometric Information Anonymization33
Ensemble learning-based adaptive and adversarial techniques for APT attack detection32
A large scale analysis of code security in public repositories32
A survey of anomaly detection methods for power grids31
Tracing the evolution of cyber resilience: a historical and conceptual review30
Detection, characterization, and profiling DoH Malicious traffic using statistical pattern recognition30
Phish-Sight: a new approach for phishing detection using dominant colors on web pages and machine learning30
Adversarial robustness of deep reinforcement learning-based intrusion detection29
Enhancing phishing email detection with stylometric features and classifier stacking28
Digital Twin-Enabled Incident Detection and Response: A Systematic Review of Critical Infrastructures Applications28
A cyber defense system against phishing attacks with deep learning game theory and LSTM-CNN with African vulture optimization algorithm (AVOA)28
Attribute inference privacy protection for pre-trained models27
“Animation” URL in NFT marketplaces considered harmful for privacy27
Improving spam email classification accuracy using ensemble techniques: a stacking approach27
Securing air-gapped systems-review of covert techniques for data ex-filtration and a new clause proposal for ISO 2700126
Certified unlearning for a trustworthy machine learning-based access control administration25
Construction of network pentest-defense adversarial environment based on NASim25
Semi-supervised approach for detecting malicious domains in TLDs in their first query25
Automated cybersecurity impact propagation across business processes using process mining techniques24
Deceiving supervised machine learning models via adversarial data poisoning attacks: a case study with USB keyboards24
Privacy information propagation in online social networks - a case study based on Weibo data24
GaTeBaSep: game theory-based security protocol against ARP spoofing attacks in software-defined networks24
Enhancing national security: a multidimensional situational awareness model for emerging economic crime prevention24
Secure outsourcing of manufacturing compliance checks24
Analyzing shared keys in X.509 certificates with domain ownership24
Selfish or Malicious: Price of malice in human-centric security decision-making for attack graph-based interdependent systems24
Developers’ mindset on self-adaptive privacy and its requirements for cloud computing environments23
Cross-Silo Federated Learning in Security Operations Centers for effective malware detection23
Tackling smart city security: deep learning approach utilizing feature selection and two-level cooperative framework optimized by adapted metaheuristics algorithm23
Efficient authentication scheme for heterogeneous signcryption with cryptographic reverse firewalls for VANETs23
BuKc: A novel bottom-up approach for enhanced data anonymization in apache spark23
From Prey to Protect: Exploring Social Engineering Through Games and Simulation. Trust, Awareness, and Phishing Defense23
Generative AI for pentesting: the good, the bad, the ugly22
Generating adversarial examples with collaborative generative models22
A systematic mapping study on security for systems of systems22
Authentication in Internet of Things, protocols, attacks, and open issues: a systematic literature review22
Business process models and simulation to enable GDPR compliance22
Advancements and challenges in privacy-preserving split learning: experimental findings and future directions22
Unmasking SDN flow table saturation: fingerprinting, attacks and defenses22
Blockchain-based data integrity framework for Internet of Things22
Spatial de-correlation of generated keys from wireless channels using adversarial deep learning21
A generic framework for blockchain-assisted on-chain auditing for off-chain storage21
Selected papers from the 29th European Symposium on Research in Computer Security (by invite-only)21
Multi-cloud applications: data and code fragmentation for improved security21
Interpretable information fusion and small sample dataset expansion in power system anomaly detection based on artificial intelligence algorithms20
A Comprehensive User Study on Medical Device Threat Modeling Methodologies and CyberLlama2 - MEDICALHARM Threat Modeling Assistant.20
Cyber-security gamification in federation of cyber ranges: design, implementation, and evaluation20
Exploring the potential of deep learning and machine learning techniques for randomness analysis to enhance security on IoT20
Adversarial attack detection framework based on optimized weighted conditional stepwise adversarial network19
RLET: a lightweight model for ubiquitous multi-class intrusion detection in sustainable and secured smart environment19
Estimating vulnerability metrics with word embedding and multiclass classification methods19
DevSecOps practices and tools19
WEFT: a consistent and tamper-proof methodology for acquisition of automatically verifiable forensic web evidence19
Multi-user covert communication in power internet of things networks19
A fog-based anonymous authentication scheme with location privacy for wireless body area network with FPGA implementation18
Network-Based Real-Time Detection of Data Manipulation Attacks in Industrial Control Systems18
International journal of information security: a bibliometric study, 2007–202318
Malicious uses of blockchains by malware: from the analysis to Smart-Zephyrus18
Comprehensive review on machine learning and deep learning techniques for malware detection in android and IoT devices18
A Data-centric approach for safe and secure large language models against threatening and toxic content18
Trust attack prevention based on Spark-blockchain in social IoT: a survey17
A blockchain-based trust and reputation model resilient to forgery attacks for data sharing scenarios (RWS-BTRM)17
Two-stage advanced persistent threat (APT) attack on an IEC 61850 power grid substation17
Identifying factors influencing the duration of zero-day vulnerabilities17
BSDS-ShareCrypt: a blockchain-enabled framework for secure, anonymous, and accountable data sharing in cloud-IoT environments using aggregate key searchable encryption17
Adversarial attacks against mouse- and keyboard-based biometric authentication: black-box versus domain-specific techniques17
Toward a unified and secure approach for extraction of forensic digital evidence from an IoT device17
A Framework for Drift Detection and Adaptation in AI-driven Anomaly and Threat Detection Systems16
A conflict-aware active BLE state machine learning and state coverage-guided gray-box fuzz testing method16
A systematic overview on methods to protect sensitive data provided for various analyses16
A comprehensive Blockchain-oriented secure framework for SDN/Fog-based IoUT16
Correction to: CARNYX: A framework for vulnerability detection via power consumption analysis in embedded systems16
TENET: a new hybrid network architecture for adversarial defense16
ANS-based compression and encryption with 128-bit security16
Generating ICS vulnerability playbooks with open standards16
Correction: Maritime cybersecurity: protecting digital seas16
Analysis of OSPU security effect and data assembly verification under semi-network OS architecture16
FKSS: A fast keyword search scheme with access control for cloud-assisted edge computing15
Novel mechanism for anonymous reporting and anonymous rewarding using blockchain technology15
Selfish mining attack in blockchain: a systematic literature review15
PayScan: Detection and Security Analysis of Payment Libraries in Android Apps15
A unit-based symbolic execution method for detecting memory corruption vulnerabilities in executable codes15
Cyber–physical risk assessment for false data injection attacks considering moving target defences15
A comprehensive analysis of cryptocurrency breaches at endpoint15
Abuse-freeness in contract signing: a blockchain-based proposal15
Non-Alpha-Num: a novel architecture for generating adversarial examples for bypassing NLP-based clickbait detection mechanisms14
Revisiting QUIC attacks: a comprehensive review on QUIC security and a hands-on study14
Pioneering automated vulnerability detection for smart contracts in blockchain using KEVM: Guardian ADRGAN14
Efficient and interpretable SRU combined with TabNet for network intrusion detection in the big data environment14
Protection of centralized SDN control plane from high-rate Packet-In messages14
Anonymous provision of privacy-sensitive services using blockchain and decentralised storage14
Performance analysis of capsule networks for detecting GPS spoofing attacks on unmanned aerial vehicles14
An overview of proposals towards the privacy-preserving publication of trajectory data14
Factors influencing Swedish citizens’ willingness to provide their mobile phones to forensic examination14
Large language models for software vulnerability detection: a guide for researchers on models, methods, techniques, datasets, and metrics14
Correction: Cryptocurrency recovery framework using pre-signed transaction13
Progressive attack graph: a technique for scalable and adaptive attack graph generation13
Intrusion detection in IoT network using temporal wavelet augmented deep dense and LSTM auto-encoders13
Designated-verifier zk-SNARKs made easy13
A computationally efficient dimensionality reduction and attack classification approach for network intrusion detection13
Retraction Note: Deep learning based network intrusion detection system: a systematic literature review and future scopes13
Maritime decision-makers and cyber security: deck officers’ perception of cyber risks towards IT and OT systems13
Vulnerability discovery based on source code patch commit mining: a systematic literature review13
Email bombing attack detection and mitigation using machine learning13
Identifying Open-Source Threat Detection Resources on GitHub: A Scalable Machine Learning Approach13
Detecting malicious nodes using game theory and reinforcement learning in software-defined networks12
Federated learning for misbehaviour detection with variational autoencoders and Gaussian mixture models12
Deep behavioral analysis of machine learning algorithms against data poisoning12
Balancing the act? Resampling versus imbalanced data for Wi-Fi IDS12
SCAnME - scanner comparative analysis and metrics for evaluation12
Enhancing DevSecOps practice with Large Language Models and Security Chaos Engineering12
Securing the IoT ecosystem: ASIC-based hardware realization of Ascon lightweight cipher12
A deep learning approach based on multi-view consensus for SQL injection detection12
Federated learning-based intrusion detection system for Internet of Things11
CARNYX: A framework for vulnerability detection via power consumption analysis in embedded systems11
A personalized learning theory-based cyber-security training exercise11
Transformer or Autoencoder? Who is the ultimate adversary for attack detectors?11
Short- versus long-term performance of detection models for obfuscated MSOffice-embedded malware11
Bridging cybersecurity with digital twin technology: a thematic analysis11
A comprehensive survey of phishing: mediums, intended targets, attack and defence techniques and a novel taxonomy11
Evaluating ASCERT: generative AI for cyber-range scenario generation11
Aldp-fl: an adaptive local differential privacy-based federated learning mechanism for IoT11
0.092844009399414