Journal of Information Security and Applications

Papers
(The H4-Index of Journal of Information Security and Applications is 29. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2020-03-01 to 2024-03-01.)
ArticleCitations
A Deep Learning-based Cryptocurrency Price Prediction Scheme for Financial Institutions110
Blockchain based secured information sharing protocol in supply chain management system with key distribution mechanism82
Computational intelligence intrusion detection techniques in mobile cloud computing environments: Review, taxonomy, and open research issues64
Enhanced credit card fraud detection based on SVM-recursive feature elimination and hyper-parameters optimization63
Security and privacy of UAV data using blockchain technology62
Multiple grayscale image encryption using cross-coupled chaotic maps57
Attack classification of an intrusion detection system using deep learning and hyperparameter optimization56
Dynamic pricing in industrial internet of things: Blockchain application for energy management in smart cities48
A robust authentication and access control protocol for securing wireless healthcare sensor networks48
Adversarial attacks on machine learning cybersecurity defences in Industrial Control Systems45
A secure blockchain-based e-health records storage and sharing scheme44
Cyber security for fog-based smart grid SCADA systems: Solutions and challenges43
Agent architecture of an intelligent medical system based on federated learning and blockchain technology43
Blockchain and quantum blind signature-based hybrid scheme for healthcare 5.0 applications42
Deterministic chaos game: A new fractal based pseudo-random number generator and its cryptographic application40
Trust-aware and cooperative routing protocol for IoT security39
A TAN based hybrid model for android malware detection38
Multi-view deep learning for zero-day Android malware detection37
Weaponized AI for cyber attacks36
Voting extreme learning machine based distributed denial of service attack detection in cloud computing35
Blockchain-empowered cloud architecture based on secret sharing for smart city34
Survey of false data injection in smart power grid: Attacks, countermeasures and challenges34
ESEAP: ECC based secure and efficient mutual authentication protocol using smart card33
Blockchain-Enabled healthcare system for detection of diabetes32
A copy-move image forgery detection technique based on tetrolet transform31
A three-factor anonymous user authentication scheme for Internet of Things environments30
Dynamic 3D scrambled image based RGB image encryption scheme using hyperchaotic system and DNA encoding30
Evaluation metric for crypto-ransomware detection using machine learning30
A robust copy-move forgery detection technique based on discrete cosine transform and cellular automata29
An enhanced scalable and secure RFID authentication protocol for WBAN within an IoT environment29
0.076588869094849