Journal of Information Security and Applications

Papers
(The H4-Index of Journal of Information Security and Applications is 24. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2021-11-01 to 2025-11-01.)
ArticleCitations
Editorial Board117
Robust zero-watermarking algorithm via multi-scale feature analysis for medical images71
Detection of Evasive Android Malware Using EigenGCN52
Merkle multi-branch hash tree-based dynamic data integrity auditing for B5G network cloud storage50
Robust watermarking based on optimal synchronization signal45
DRAC: A dynamic fine-grained access control scheme for cloud storage with censorship-coerced resistance41
Improving data extraction accuracy for median filter-based data hiding method41
Understanding practitioner perspectives on using privacy harm categories for privacy risk assessment39
Statistical privacy protection for secure data access control in cloud36
A lightweight intrusion detection system for connected autonomous vehicles based on ECANet and image encoding33
Editorial Board33
Lightweight privacy-preserving authenticated key agreements using physically unclonable functions for internet of drones32
Refined statistical attacks against searchable symmetric encryption using non-indexed documents32
Current approaches and future directions for Cyber Threat Intelligence sharing: A survey32
Smart contracts vulnerability detection model based on adversarial multi-task learning29
The reality of backdoored S-Boxes—An eye opener28
Synergistic compensation for RGB-based blind color image watermarking to withstand JPEG compression28
PGAN framework for synthesizing sensor data privately27
Distinguishing and key recovery attacks on the reduced-round SNOW-V and SNOW-Vi26
Incorporating deep learning into capacitive images for smartphone user authentication26
A novel 5-bit S-box design for lightweight cryptography algorithms25
A deep learning assisted personalized deception system for countering web application attacks25
Bane or Boon: Measuring the effect of evasive malware on system call classifiers25
Impossible differential cryptanalysis of FBC-12824
0.31525897979736