Journal of Information Security and Applications

Papers
(The H4-Index of Journal of Information Security and Applications is 27. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2020-11-01 to 2024-11-01.)
ArticleCitations
A Deep Learning-based Cryptocurrency Price Prediction Scheme for Financial Institutions127
Enhanced credit card fraud detection based on SVM-recursive feature elimination and hyper-parameters optimization78
Attack classification of an intrusion detection system using deep learning and hyperparameter optimization70
Computational intelligence intrusion detection techniques in mobile cloud computing environments: Review, taxonomy, and open research issues69
Security and privacy of UAV data using blockchain technology69
A dependable hybrid machine learning model for network intrusion detection58
Adversarial attacks on machine learning cybersecurity defences in Industrial Control Systems58
Blockchain and quantum blind signature-based hybrid scheme for healthcare 5.0 applications57
A secure blockchain-based e-health records storage and sharing scheme54
Weaponized AI for cyber attacks50
Agent architecture of an intelligent medical system based on federated learning and blockchain technology48
Dynamic pricing in industrial internet of things: Blockchain application for energy management in smart cities43
Multi-view deep learning for zero-day Android malware detection41
Blockchain-empowered cloud architecture based on secret sharing for smart city40
Blockchain-Enabled healthcare system for detection of diabetes39
Evaluating the cyber security readiness of organizations and its influence on performance38
Evaluation metric for crypto-ransomware detection using machine learning37
EASBF: An efficient authentication scheme over blockchain for fog computing-enabled internet of vehicles36
Privacy-preserving in smart contracts using blockchain and artificial intelligence for cyber risk measurements35
Attention based multi-agent intrusion detection systems using reinforcement learning35
Dynamic 3D scrambled image based RGB image encryption scheme using hyperchaotic system and DNA encoding34
Improved Sine-Tangent chaotic map with application in medical images encryption32
Bi-GISIS KE: Modified key exchange protocol with reusable keys for IoT security31
A novel wide & deep transfer learning stacked GRU framework for network intrusion detection30
DTMIC: Deep transfer learning for malware image classification29
An enhanced scalable and secure RFID authentication protocol for WBAN within an IoT environment28
A lightweight and provable secure identity-based generalized proxy signcryption (IBGPS) scheme for Industrial Internet of Things (IIoT)27
0.10195207595825