Journal of Information Security and Applications

Papers
(The H4-Index of Journal of Information Security and Applications is 26. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2022-05-01 to 2026-05-01.)
ArticleCitations
Editorial Board136
Understanding practitioner perspectives on using privacy harm categories for privacy risk assessment107
Bane or Boon: Measuring the effect of evasive malware on system call classifiers58
Lightweight privacy-preserving authenticated key agreements using physically unclonable functions for internet of drones53
Refined statistical attacks against searchable symmetric encryption using non-indexed documents49
The reality of backdoored S-Boxes—An eye opener43
Impossible differential cryptanalysis of FBC-12842
Plaintext recovery and tag guessing attacks on authenticated encryption algorithm COLM41
Editorial Board38
A lightweight intrusion detection system for connected autonomous vehicles based on ECANet and image encoding37
Collusion-resistant multi-user searchable symmetric encryption with conjunctive query and suppressed pattern leakage36
Maaker: A framework for detecting and defeating evasion techniques in Android malware36
Cybersecurity Digital Twins: Concept, blueprint, and challenges for multi-ownership digital service chains36
DRAC: A dynamic fine-grained access control scheme for cloud storage with censorship-coerced resistance34
PGAN framework for synthesizing sensor data privately33
PVO-based reversible data hiding using bit plane segmentation and pixel expansion29
Synergistic compensation for RGB-based blind color image watermarking to withstand JPEG compression29
Incorporating deep learning into capacitive images for smartphone user authentication29
Detection of Evasive Android Malware Using EigenGCN28
Smart contracts vulnerability detection model based on adversarial multi-task learning28
A 3D robust chaotic speech encryption scheme based on feature hashing and key distribution28
A novel 5-bit S-box design for lightweight cryptography algorithms27
Robust zero-watermarking algorithm via multi-scale feature analysis for medical images27
Improving data extraction accuracy for median filter-based data hiding method26
Current approaches and future directions for Cyber Threat Intelligence sharing: A survey26
Robust watermarking based on optimal synchronization signal26
0.096494913101196