International Journal of Information Security

Papers
(The TQCC of International Journal of Information Security is 4. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2020-04-01 to 2024-04-01.)
ArticleCitations
Robotics cyber security: vulnerabilities, attacks, countermeasures, and recommendations79
A novel scalable intrusion detection system based on deep learning74
Survey on image encryption techniques using chaotic maps in spatial, transform and spatiotemporal domains54
Cyber security in New Space48
MAPAS: a practical deep learning-based android malware detection system38
A blockchain-based medical data preservation scheme for telecare medical information systems26
Public key versus symmetric key cryptography in client–server authentication protocols24
Automatic analysis of attack graphs for risk mitigation and prioritization on large-scale and complex networks in Industry 4.022
A review on fake news detection 3T’s: typology, time of detection, taxonomies19
Anti-BlUFf: towards counterfeit mitigation in IC supply chains using blockchain and PUF19
DAPP: automatic detection and analysis of prototype pollution vulnerability in Node.js modules18
Applying NLP techniques to malware detection in a practical environment18
Using homomorphic encryption for privacy-preserving clustering of intrusion detection alerts13
Intelligent and behavioral-based detection of malware in IoT spectrum sensors13
Securing MQTT protocol for IoT environment using IDS based on ensemble learning12
LASSI: a lightweight authenticated key agreement protocol for fog-enabled IoT deployment12
Classifying resilience approaches for protecting smart grids against cyber threats11
ChoKIFA+: an early detection and mitigation approach against interest flooding attacks in NDN11
A content-based deep intrusion detection system11
Deep SARSA-based reinforcement learning approach for anomaly network intrusion detection system11
A systematic literature review for network intrusion detection system (IDS)10
Risk assessment of cyber-attacks on telemetry-enabled cardiac implantable electronic devices (CIED)10
MalFamAware: automatic family identification and malware classification through online clustering10
An efficient intrusion detection system for MQTT-IoT using enhanced chaotic salp swarm algorithm and LightGBM10
Evaluating visualization approaches to detect abnormal activities in network traffic data10
Attribute-based encryption and sticky policies for data access control in a smart home scenario: a comparison on networked smart object middleware9
Security analysis on “Three-factor authentication protocol using physical unclonable function for IoV”9
Insider attack mitigation in a smart metering infrastructure using reputation score and blockchain technology9
A secure architecture for TCP/UDP-based cloud communications9
Scalable, password-based and threshold authentication for smart homes9
DEALER: decentralized incentives for threat intelligence reporting and exchange8
Design and implementation of a new lightweight chaos-based cryptosystem to secure IoT communications8
Combining behavioral biometrics and session context analytics to enhance risk-based static authentication in web applications8
Highly private blockchain-based management system for digital COVID-19 certificates8
PatrIoT: practical and agile threat research for IoT8
Continuous improvement process (CIP)-based privacy-preserving framework for smart connected toys8
Browser-in-the-Middle (BitM) attack8
Thresholdizing HashEdDSA: MPC to the Rescue7
A systematic literature review on wearable health data publishing under differential privacy7
BLoCNet: a hybrid, dataset-independent intrusion detection system using deep learning7
Privacy preserving data sharing and analysis for edge-based architectures7
Machine learning approach to vulnerability detection in OAuth 2.0 authentication and authorization flow7
CT-GCN: a phishing identification model for blockchain cryptocurrency transactions7
Cyber insurance: state of the art, trends and future directions7
Accountable privacy preserving attribute-based access control for cloud services enforced using blockchain7
DeTRACT: a decentralized, transparent, immutable and open PKI certificate framework6
A trust model for popular smart home devices6
PSO + FL = PAASO: particle swarm optimization + federated learning = privacy-aware agent swarm optimization6
How education level influences internet security knowledge, behaviour, and attitude: a comparison among undergraduates, postgraduates and working graduates6
Revisiting QUIC attacks: a comprehensive review on QUIC security and a hands-on study6
ISM-AC: an immune security model based on alert correlation and software-defined networking6
Dependency-based security risk assessment for cyber-physical systems6
A novel approach for detection of APT malware using multi-dimensional hybrid Bayesian belief network6
An intrusion detection approach based on incremental long short-term memory6
Password-authenticated searchable encryption6
Evaluating card-based protocols in terms of execution time6
Novel trust-aware intrusion detection and prevention system for 5G MANET–Cloud6
A context-centered methodology for IoT forensic investigations6
Systematic review of SIEM technology: SIEM-SC birth6
K maximum probability attack paths generation algorithm for target nodes in networked systems6
Mitigating insider threat by profiling users based on mouse usage pattern: ensemble learning and frequency domain analysis5
A wrinkle in time: a case study in DNS poisoning5
The Agent Web Model: modeling web hacking for reinforcement learning5
A study of machine learning-based models for detection, control, and mitigation of cyberbullying in online social media5
Adversarial security mitigations of mmWave beamforming prediction models using defensive distillation and adversarial retraining5
Attention: there is an inconsistency between android permissions and application metadata!5
Privacy in targeted advertising on mobile devices: a survey5
A survey on interest packet flooding attacks and its countermeasures in named data networking5
Cyber–physical risk assessment for false data injection attacks considering moving target defences5
Extending access control in AWS IoT through event-driven functions: an experimental evaluation using a smart lock system5
Additional kernel observer: privilege escalation attack prevention mechanism focusing on system call privilege changes5
From zero-shot machine learning to zero-day attack detection5
Enhancing spatial and temporal utilities in differentially private moving objects database release5
A quantitative assessment of security risks based on a multifaceted classification approach5
On the detection of lateral movement through supervised machine learning and an open-source tool to create turnkey datasets from Sysmon logs5
IoT-oriented high-efficient anti-malware hardware focusing on time series metadata extractable from inside a processor core4
DNS exfiltration detection in the presence of adversarial attacks and modified exfiltrator behaviour4
PageDumper: a mechanism to collect page table manipulation information at run-time4
A survey on analyzing encrypted network traffic of mobile devices4
Authenticated logarithmic-order supersingular isogeny group key exchange4
Efficient attribute-based encryption with repeated attributes optimization4
Defeating traffic analysis via differential privacy: a case study on streaming traffic4
Intrusion detection system over real-time data traffic using machine learning methods with feature selection approaches4
An efficient privacy-preserving pay-by-phone system for regulated parking areas4
An autoML network traffic analyzer for cyber threat detection4
A decentralized honeypot for IoT Protocols based on Android devices4
Challenges of post-quantum digital signing in real-world applications: a survey4
0.021875143051147