Journal of Information Security and Applications

Papers
(The H4-Index of Journal of Information Security and Applications is 25. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2021-09-01 to 2025-09-01.)
ArticleCitations
Editorial Board105
Distinguishing and key recovery attacks on the reduced-round SNOW-V and SNOW-Vi53
A deep learning assisted personalized deception system for countering web application attacks49
Refined statistical attacks against searchable symmetric encryption using non-indexed documents48
Editorial Board47
A lightweight intrusion detection system for connected autonomous vehicles based on ECANet and image encoding42
SBRAC: Blockchain-based sealed-bid auction with bidding price privacy and public verifiability39
Dynamic secure multi-keyword ranked search over encrypted cloud data36
Synergistic compensation for RGB-based blind color image watermarking to withstand JPEG compression34
Incorporating deep learning into capacitive images for smartphone user authentication33
Image data security using Quasigroup combined with Fibonacci Q-transformation32
Plaintext recovery and tag guessing attacks on authenticated encryption algorithm COLM31
The reality of backdoored S-Boxes—An eye opener30
Maaker: A framework for detecting and defeating evasion techniques in Android malware29
Lightweight privacy-preserving authenticated key agreements using physically unclonable functions for internet of drones29
Smart contracts vulnerability detection model based on adversarial multi-task learning28
Implementation and evaluation of a privacy-preserving distributed ABC scheme based on multi-signatures27
Statistical privacy protection for secure data access control in cloud27
Merkle multi-branch hash tree-based dynamic data integrity auditing for B5G network cloud storage26
PVO-based reversible data hiding using bit plane segmentation and pixel expansion26
Robust zero-watermarking algorithm via multi-scale feature analysis for medical images26
Detection of Evasive Android Malware Using EigenGCN25
DRAC: A dynamic fine-grained access control scheme for cloud storage with censorship-coerced resistance25
A novel 5-bit S-box design for lightweight cryptography algorithms25
Current approaches and future directions for Cyber Threat Intelligence sharing: A survey25
0.28895711898804