International Journal of Information Security

Papers
(The TQCC of International Journal of Information Security is 7. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2021-11-01 to 2025-11-01.)
ArticleCitations
The rise of “security and privacy”: bibliometric analysis of computer privacy research142
An intrusion detection approach based on incremental long short-term memory136
Using machine learning to detect network intrusions in industrial control systems: a survey83
Feature engineering impact on position falsification attacks detection in vehicular ad-hoc network59
Verifiability for privacy-preserving computing on distributed data — a survey57
Fast but approximate homomorphic k-means based on masking technique57
AutoPKI: public key infrastructure for IoT with automated trust transfer54
Outlier-oriented poisoning attack: a grey-box approach to disturb decision boundaries by perturbing outliers in multiclass learning45
Efficient arabic and english social spam detection using a transformer and 2D convolutional neural network-based deep learning filter37
BitCracker: BitLocker meets GPUs36
Systematic review of SIEM technology: SIEM-SC birth36
Anomalous behavior detection-based approach for authenticating smart home system users35
A comprehensive approach for mitigating impersonation in online assessment: integrity policy and random authentication34
Automated broken object-level authorization attack detection in REST APIs through OpenAPI to colored petri nets transformation32
Fairness as a Service (FaaS): verifiable and privacy-preserving fairness auditing of machine learning systems31
Weighted quality criteria for cyber threat intelligence: assessment and prioritisation in the MISP data model30
Random resampling algorithms for addressing the imbalanced dataset classes in insider threat detection30
BLoCNet: a hybrid, dataset-independent intrusion detection system using deep learning29
Balancing usability, user experience, security and privacy in XR systems: a multidimensional approach28
can-sleuth: Sleuthing out the capabilities, limitations, and performance impacts of automotive intrusion detection datasets27
Adaptive trust evaluation model based on container security analysis in the Docker platform27
Malware classification approaches utilizing binary and text encoding of permissions27
Xai-driven black-box adversarial attacks on network intrusion detectors26
Survey on image encryption techniques using chaotic maps in spatial, transform and spatiotemporal domains26
A vulnerability assessment and exploitation analysis of a powerline communication HomePlug AV network adapter25
Ensemble learning-based adaptive and adversarial techniques for APT attack detection25
Tracing the evolution of cyber resilience: a historical and conceptual review25
Model-Agnostic Utility-Preserving Biometric Information Anonymization25
MEDICALHARM: A threat modeling designed for modern medical devices and a comprehensive study on effectiveness, user satisfaction, and security perspectives25
Acnn: arbitrary trace attacks based on leakage area detection24
Unmasking the common traits: an ensemble approach for effective malware detection24
Digital Twin-Enabled Incident Detection and Response: A Systematic Review of Critical Infrastructures Applications24
A cyber defense system against phishing attacks with deep learning game theory and LSTM-CNN with African vulture optimization algorithm (AVOA)23
Improving spam email classification accuracy using ensemble techniques: a stacking approach23
Pseudonym shuffling-driven blockchain and Autoencoder-based secure E-healthcare data management22
Adversarial robustness of deep reinforcement learning-based intrusion detection22
Restricting data-leakage using fine-grained access control on OSN objects22
A perspective–retrospective analysis of diversity in signature-based open-source network intrusion detection systems22
A survey of anomaly detection methods for power grids21
Detection, characterization, and profiling DoH Malicious traffic using statistical pattern recognition21
Phish-Sight: a new approach for phishing detection using dominant colors on web pages and machine learning21
Enhancing phishing email detection with stylometric features and classifier stacking21
Attribute inference privacy protection for pre-trained models20
“Animation” URL in NFT marketplaces considered harmful for privacy20
Securing air-gapped systems-review of covert techniques for data ex-filtration and a new clause proposal for ISO 2700119
Business process models and simulation to enable GDPR compliance19
Construction of network pentest-defense adversarial environment based on NASim19
Generating adversarial examples with collaborative generative models18
Analyzing shared keys in X.509 certificates with domain ownership18
Certified unlearning for a trustworthy machine learning-based access control administration18
Automated cybersecurity impact propagation across business processes using process mining techniques18
Semi-supervised approach for detecting malicious domains in TLDs in their first query18
Cross-Silo Federated Learning in Security Operations Centers for effective malware detection18
GaTeBaSep: game theory-based security protocol against ARP spoofing attacks in software-defined networks18
Secure outsourcing of manufacturing compliance checks17
Privacy information propagation in online social networks - a case study based on Weibo data17
Authentication in Internet of Things, protocols, attacks, and open issues: a systematic literature review17
A systematic mapping study on security for systems of systems17
Deceiving supervised machine learning models via adversarial data poisoning attacks: a case study with USB keyboards17
Tackling smart city security: deep learning approach utilizing feature selection and two-level cooperative framework optimized by adapted metaheuristics algorithm17
Developers’ mindset on self-adaptive privacy and its requirements for cloud computing environments16
Enhancing national security: a multidimensional situational awareness model for emerging economic crime prevention16
Generative AI for pentesting: the good, the bad, the ugly16
Unmasking SDN flow table saturation: fingerprinting, attacks and defenses16
Efficient authentication scheme for heterogeneous signcryption with cryptographic reverse firewalls for VANETs16
A systematic literature review on wearable health data publishing under differential privacy15
WEFT: a consistent and tamper-proof methodology for acquisition of automatically verifiable forensic web evidence15
Cyber-security gamification in federation of cyber ranges: design, implementation, and evaluation15
Blockchain-based data integrity framework for Internet of Things15
Advancements and challenges in privacy-preserving split learning: experimental findings and future directions15
A generic framework for blockchain-assisted on-chain auditing for off-chain storage15
Exploring the potential of deep learning and machine learning techniques for randomness analysis to enhance security on IoT15
Multi-cloud applications: data and code fragmentation for improved security15
Spatial de-correlation of generated keys from wireless channels using adversarial deep learning15
Multi-user covert communication in power internet of things networks14
Estimating vulnerability metrics with word embedding and multiclass classification methods14
A first look at references from the dark to the surface web world: a case study in Tor14
RLET: a lightweight model for ubiquitous multi-class intrusion detection in sustainable and secured smart environment14
A Comprehensive User Study on Medical Device Threat Modeling Methodologies and CyberLlama2 - MEDICALHARM Threat Modeling Assistant.14
A fog-based anonymous authentication scheme with location privacy for wireless body area network with FPGA implementation14
Adversarial attack detection framework based on optimized weighted conditional stepwise adversarial network14
DevSecOps practices and tools14
International journal of information security: a bibliometric study, 2007–202313
Trust attack prevention based on Spark-blockchain in social IoT: a survey13
Identifying factors influencing the duration of zero-day vulnerabilities13
Two-stage advanced persistent threat (APT) attack on an IEC 61850 power grid substation13
A Data-centric approach for safe and secure large language models against threatening and toxic content13
Comprehensive review on machine learning and deep learning techniques for malware detection in android and IoT devices13
ANS-based compression and encryption with 128-bit security13
Toward a unified and secure approach for extraction of forensic digital evidence from an IoT device13
A blockchain-based trust and reputation model resilient to forgery attacks for data sharing scenarios (RWS-BTRM)12
A comprehensive Blockchain-oriented secure framework for SDN/Fog-based IoUT12
A systematic overview on methods to protect sensitive data provided for various analyses12
Adversarial attacks against mouse- and keyboard-based biometric authentication: black-box versus domain-specific techniques12
Malicious uses of blockchains by malware: from the analysis to Smart-Zephyrus12
Protection of centralized SDN control plane from high-rate Packet-In messages11
TENET: a new hybrid network architecture for adversarial defense11
An overview of proposals towards the privacy-preserving publication of trajectory data11
Correction: Maritime cybersecurity: protecting digital seas11
Anonymous provision of privacy-sensitive services using blockchain and decentralised storage11
Revisiting QUIC attacks: a comprehensive review on QUIC security and a hands-on study11
A comprehensive analysis of cryptocurrency breaches at endpoint11
Novel mechanism for anonymous reporting and anonymous rewarding using blockchain technology11
Challenges of post-quantum digital signing in real-world applications: a survey11
Abuse-freeness in contract signing: a blockchain-based proposal11
Analysis of OSPU security effect and data assembly verification under semi-network OS architecture11
A conflict-aware active BLE state machine learning and state coverage-guided gray-box fuzz testing method11
PayScan: Detection and Security Analysis of Payment Libraries in Android Apps11
Selfish mining attack in blockchain: a systematic literature review11
Generating ICS vulnerability playbooks with open standards10
Federated learning for misbehaviour detection with variational autoencoders and Gaussian mixture models10
Cyber–physical risk assessment for false data injection attacks considering moving target defences10
Non-Alpha-Num: a novel architecture for generating adversarial examples for bypassing NLP-based clickbait detection mechanisms10
A Framework for Drift Detection and Adaptation in AI-driven Anomaly and Threat Detection Systems10
Performance analysis of capsule networks for detecting GPS spoofing attacks on unmanned aerial vehicles10
A unit-based symbolic execution method for detecting memory corruption vulnerabilities in executable codes10
Correction to: CARNYX: A framework for vulnerability detection via power consumption analysis in embedded systems10
Deep behavioral analysis of machine learning algorithms against data poisoning10
Maritime decision-makers and cyber security: deck officers’ perception of cyber risks towards IT and OT systems9
Securing the IoT ecosystem: ASIC-based hardware realization of Ascon lightweight cipher9
Identifying Open-Source Threat Detection Resources on GitHub: A Scalable Machine Learning Approach9
Factors influencing Swedish citizens’ willingness to provide their mobile phones to forensic examination9
Scalable, password-based and threshold authentication for smart homes9
Intrusion detection in IoT network using temporal wavelet augmented deep dense and LSTM auto-encoders9
Efficient and interpretable SRU combined with TabNet for network intrusion detection in the big data environment9
A computationally efficient dimensionality reduction and attack classification approach for network intrusion detection9
Progressive attack graph: a technique for scalable and adaptive attack graph generation9
Correction: Cryptocurrency recovery framework using pre-signed transaction9
Pioneering automated vulnerability detection for smart contracts in blockchain using KEVM: Guardian ADRGAN8
Retraction Note: Deep learning based network intrusion detection system: a systematic literature review and future scopes8
Enhancing DevSecOps practice with Large Language Models and Security Chaos Engineering8
Transformer or Autoencoder? Who is the ultimate adversary for attack detectors?8
Detecting malicious nodes using game theory and reinforcement learning in software-defined networks8
Vulnerability discovery based on source code patch commit mining: a systematic literature review8
Large language models for software vulnerability detection: a guide for researchers on models, methods, techniques, datasets, and metrics8
A deep learning approach based on multi-view consensus for SQL injection detection8
SCAnME - scanner comparative analysis and metrics for evaluation8
Email bombing attack detection and mitigation using machine learning8
Balancing the act? Resampling versus imbalanced data for Wi-Fi IDS8
Short- versus long-term performance of detection models for obfuscated MSOffice-embedded malware8
A comprehensive survey of phishing: mediums, intended targets, attack and defence techniques and a novel taxonomy7
Citizens’ engagement with cybersecurity measures in Bangladesh: a cross-sectional study7
P2ADF: a privacy-preserving attack detection framework in fog-IoT environment7
From sinking to saving: MITRE ATT &CK and D3FEND frameworks for maritime cybersecurity7
Integrating the edge computing paradigm into the development of IoT forensic methodologies7
Accessible password strength assessment method for visually challenged users7
IoT device security audit tools: a comprehensive analysis and a layered architecture approach for addressing expanded security requirements7
DFTMicroagg: a dual-level anonymization algorithm for smart grid data7
Bridging cybersecurity with digital twin technology: a thematic analysis7
SmartiPhish: a reinforcement learning-based intelligent anti-phishing solution to detect spoofed website attacks7
Start thinking in graphs: using graphs to address critical attack paths in a Microsoft cloud tenant7
Security analysis and improvement of a privacy-preserving authentication scheme in VANET7
Blockchain-based multi-organizational cyber risk management framework for collaborative environments7
How engaged are you? A forensic analysis of the Oura Ring Gen 3 application across iOS, Android, and Cloud platforms7
An end-to-end intrusion detection system with IoT dataset using deep learning with unsupervised feature extraction7
Federated learning-based intrusion detection system for Internet of Things7
CARNYX: A framework for vulnerability detection via power consumption analysis in embedded systems7
Mobile botnet detection: a comprehensive survey7
Investigation of application layer DDoS attacks in legacy and software-defined networks: A comprehensive review7
A review on digital twins for power generation and distribution7
Educational escape rooms for raising information privacy competences: An empirical validation7
A personalized learning theory-based cyber-security training exercise7
Aldp-fl: an adaptive local differential privacy-based federated learning mechanism for IoT7
0.10929203033447