Journal of Information Security and Applications

Papers
(The median citation count of Journal of Information Security and Applications is 2. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2020-11-01 to 2024-11-01.)
ArticleCitations
A Deep Learning-based Cryptocurrency Price Prediction Scheme for Financial Institutions127
Enhanced credit card fraud detection based on SVM-recursive feature elimination and hyper-parameters optimization78
Attack classification of an intrusion detection system using deep learning and hyperparameter optimization70
Security and privacy of UAV data using blockchain technology69
Computational intelligence intrusion detection techniques in mobile cloud computing environments: Review, taxonomy, and open research issues69
A dependable hybrid machine learning model for network intrusion detection58
Adversarial attacks on machine learning cybersecurity defences in Industrial Control Systems58
Blockchain and quantum blind signature-based hybrid scheme for healthcare 5.0 applications57
A secure blockchain-based e-health records storage and sharing scheme54
Weaponized AI for cyber attacks50
Agent architecture of an intelligent medical system based on federated learning and blockchain technology48
Dynamic pricing in industrial internet of things: Blockchain application for energy management in smart cities43
Multi-view deep learning for zero-day Android malware detection41
Blockchain-empowered cloud architecture based on secret sharing for smart city40
Blockchain-Enabled healthcare system for detection of diabetes39
Evaluating the cyber security readiness of organizations and its influence on performance38
Evaluation metric for crypto-ransomware detection using machine learning37
EASBF: An efficient authentication scheme over blockchain for fog computing-enabled internet of vehicles36
Privacy-preserving in smart contracts using blockchain and artificial intelligence for cyber risk measurements35
Attention based multi-agent intrusion detection systems using reinforcement learning35
Dynamic 3D scrambled image based RGB image encryption scheme using hyperchaotic system and DNA encoding34
Improved Sine-Tangent chaotic map with application in medical images encryption32
Bi-GISIS KE: Modified key exchange protocol with reusable keys for IoT security31
A novel wide & deep transfer learning stacked GRU framework for network intrusion detection30
DTMIC: Deep transfer learning for malware image classification29
An enhanced scalable and secure RFID authentication protocol for WBAN within an IoT environment28
A lightweight and provable secure identity-based generalized proxy signcryption (IBGPS) scheme for Industrial Internet of Things (IIoT)27
Medical blockchain: Data sharing and privacy preserving of EHR based on smart contract26
A secure end-to-end verifiable e-voting system using blockchain and cloud server25
A provably secure dynamic ID-based authenticated key agreement framework for mobile edge computing without a trusted party25
Malware classification and composition analysis: A survey of recent developments25
On the construction of a post-quantum blockchain for smart city25
Social network behavior and public opinion manipulation25
Clustering method and symmetric/asymmetric cryptography scheme adapted to securing urban VANET networks24
Globalized firefly algorithm and chaos for designing substitution box24
BTCAS: A Blockchain-Based Thoroughly Cross-Domain Authentication Scheme24
FUPE: A security driven task scheduling approach for SDN-based IoT–Fog networks23
An image encryption scheme based on double chaotic cyclic shift and Josephus problem22
On machine learning effectiveness for malware detection in Android OS using static analysis data22
2D Logistic-Adjusted-Chebyshev map for visual color image encryption21
A new parallel processing architecture for accelerating image encryption based on chaos21
Image-based malware representation approach with EfficientNet convolutional neural networks for effective malware classification21
A cancelable biometric authentication system based on feature-adaptive random projection21
Cryptanalysis and improvement of a two-factor user authentication scheme for smart home21
Multi-directional block based PVD and modulus function image steganography to avoid FOBP and IEP21
Energy-efficient dynamic homomorphic security scheme for fog computing in IoT networks21
Simulating SQL injection vulnerability exploitation using Q-learning reinforcement learning agents20
Android mobile malware detection using fuzzy AHP20
Machine Learning and Software Defined Network to secure communications in a swarm of drones20
A certificateless ring signature scheme with batch verification for applications in VANET20
Privacy-preserving batch verification signature scheme based on blockchain for Vehicular Ad-Hoc Networks19
A privacy protection scheme for telemedicine diagnosis based on double blockchain19
Understanding cybersecurity behavioral habits: Insights from situational support19
S-FoS: A secure workflow scheduling approach for performance optimization in SDN-based IoT-Fog networks19
Chaos and compressive sensing based novel image encryption scheme19
Exact greedy algorithm based split finding approach for intrusion detection in fog-enabled IoT environment19
Deep belief network-based hybrid model for multimodal biometric system for futuristic security applications18
DAG blockchain-based lightweight authentication and authorization scheme for IoT devices18
Multicast DIS attack mitigation in RPL-based IoT-LLNs17
Deep multi-task learning for malware image classification17
Malware classification for the cloud via semi-supervised transfer learning17
A memristive RLC oscillator dynamics applied to image encryption16
A novel image encryption scheme based on non-adjacent parallelable permutation and dynamic DNA-level two-way diffusion16
NATICUSdroid: A malware detection framework for Android using native and custom permissions16
Separable reversible data hiding in an encrypted image using the adjacency pixel difference histogram15
Towards improving the performance of blind image steganalyzer using third-order SPAM features and ensemble classifier15
How is your Wi-Fi connection today? DoS attacks on WPA3-SAE15
Signaling game-based availability assessment for edge computing-assisted IoT systems with malware dissemination15
Spread-Transform Dither Modulation Watermarking of Deep Neural Network14
ETIP: An Enriched Threat Intelligence Platform for improving OSINT correlation, analysis, visualization and sharing capabilities14
A multi-view feature fusion approach for effective malware classification using Deep Learning14
Multi-user certificateless public key encryption with conjunctive keyword search for cloud-based telemedicine14
Leveraging zero knowledge proofs for blockchain-based identity sharing: A survey of advancements, challenges and opportunities14
Elliptic Curve Cryptography based authentication scheme for Internet of Medical Things14
Design and application of a personal credit information sharing platform based on consortium blockchain14
TPPSUPPLY : A traceable and privacy-preserving blockchain system architecture for the supply chain13
Attacks on cryptosystems implemented via VLSI: A review13
Lic-Sec: An enhanced AppArmor Docker security profile generator13
NaturalAE: Natural and robust physical adversarial examples for object detectors13
A Lightweight Signcryption Method for Perception Layer in Internet-of-Things13
Efficient and secure substitution box and random number generators over Mordell elliptic curves13
Shape-driven lightweight CNN for finger-vein biometrics13
A novel Byzantine fault tolerance consensus for Green IoT with intelligence based on reinforcement13
An optimized robust watermarking technique using CKGSA in frequency domain13
XGBXSS: An Extreme Gradient Boosting Detection Framework for Cross-Site Scripting Attacks Based on Hybrid Feature Selection Approach and Parameters Optimization13
An improved convolution Merkle tree-based blockchain electronic medical record secure storage scheme13
You are what the permissions told me! Android malware detection based on hybrid tactics13
Privacy preservation in Distributed Deep Learning: A survey on Distributed Deep Learning, privacy preservation techniques used and interesting research directions13
An exotic multi-dimensional conceptualization for medical image encryption exerting Rossler system and Sine map13
Data cryptography in the Internet of Things using the artificial bee colony algorithm in a smart irrigation system13
Towards an ultra lightweight block ciphers for Internet of Things13
Guidelines for GDPR compliance in Big Data systems13
CL-ASS: An efficient and low-cost certificateless aggregate signature scheme for wireless sensor networks12
NodeXP: NOde.js server-side JavaScript injection vulnerability DEtection and eXPloitation12
Pseudonym change-based privacy-preserving schemes in vehicular ad-hoc networks: A survey12
Image encryption algorithm based on improved Zigzag transformation and quaternary DNA coding12
Secure information processing for multimedia forensics using zero-trust security model for large scale data analytics in SaaS cloud computing environment12
Bounded opacity for timed systems12
Software-Defined Network enabled Vehicle to Vehicle secured data transmission protocol in VANETs12
A data hiding scheme based on the difference of image interpolation algorithms12
Detection of distributed denial of service attacks based on information theoretic approach in time series models12
Anomaly detection in a forensic timeline with deep autoencoders12
A novel sophisticated hybrid method for intrusion detection using the artificial immune system12
4D mixed chaotic system and its application to RGB image encryption using substitution-diffusion12
A PE header-based method for malware detection using clustering and deep embedding techniques11
A chaotic video steganography technique for carrying different types of secret messages11
A low-rate DDoS detection and mitigation for SDN using Renyi Entropy with Packet Drop11
NyaYa: Blockchain-based electronic law record management scheme for judicial investigations11
Blockchain-based decentralized architecture for cloud storage system11
Adaptable feature-selecting and threshold-moving complete autoencoder for DDoS flood attack mitigation11
CS-MIA: Membership inference attack based on prediction confidence series in federated learning11
An adaptable deep learning-based intrusion detection system to zero-day attacks11
Practical revocable and multi-authority CP-ABE scheme from RLWE for Cloud Computing11
IESCA: An efficient image encryption scheme using 2-D cellular automata11
Real-time and private spatio-temporal data aggregation with local differential privacy11
An ensemble classification-based approach to detect attack level of SQL injections11
Blockchain-based searchable encryption with efficient result verification and fair payment11
A security model to protect the isolation of medical data in the cloud using hybrid cryptography11
A novel hybrid permutation substitution base colored image encryption scheme for multimedia data11
A secure medical image transmission scheme aided by quantum representation11
High throughput novel architectures of TEA family for high speed IoT and RFID applications10
Secrecy-ensured NOMA-based cooperative D2D-aided fog computing under imperfect CSI10
Tree and elliptic curve based efficient and secure group key agreement protocol10
Survey of security supervision on blockchain from the perspective of technology10
Lightweight fog computing-based authentication protocols using physically unclonable functions for internet of medical things10
Blockchain-based secure and trusted data sharing scheme for autonomous vehicle underlying 5G10
A secure and lightweight anonymous mutual authentication scheme for wearable devices in Medical Internet of Things10
My data, my control: A secure data sharing and access scheme over blockchain10
Cyberprotection in IoT environments: A dynamic rule-based solution to defend smart devices10
Simple and scalable blockchain with privacy10
Denial of wallet—Defining a looming threat to serverless computing10
Android botnet detection using machine learning models based on a comprehensive static analysis approach10
A high-accuracy phishing website detection method based on machine learning10
A comparison of two hybrid ensemble techniques for network anomaly detection in spark distributed environment10
Trust and priority-based drone assisted routing and mobility and service-oriented solution for the internet of vehicles networks10
A novel 5-bit S-box design for lightweight cryptography algorithms10
Stakeholder perspectives and requirements on cybersecurity in Europe10
A new S-box construction method meeting strict avalanche criterion10
Efficient data confidentiality scheme for 5G wireless NOMA communications10
Differential cryptanalysis of WARP10
A consortium blockchain based energy trading scheme for Electric Vehicles in smart cities10
Towards a robust and trustworthy machine learning system development: An engineering perspective10
Verifiable online/offline multi-keyword search for cloud-assisted Industrial Internet of Things10
Adaptive reversible data hiding algorithm for interpolated images using sorting and coding9
A new methodology for anomaly detection of attacks in IEC 61850-based substation system9
Double layered Fridrich structure to conserve medical data privacy using quantum cryptosystem9
A distributed privacy-preserving data aggregation scheme for smart grid with fine-grained access control9
Assessing cyber threats for storyless systems9
A survey of authenticated key agreement protocols for multi-server architecture9
A novel method to generate key-dependent s-boxes with identical algebraic properties9
Universal stego post-processing for enhancing image steganography9
Adversarial machine learning in IoT from an insider point of view9
Novel Hybrid Model for Intrusion Prediction on Cyber Physical Systems’ Communication Networks based on Bio-inspired Deep Neural Network Structure9
Adaptive HEVC video steganography based on distortion compensation optimization9
Detection and mitigation of fraudulent resource consumption attacks in cloud using deep learning approach9
A new hierarchical architecture and protocol for key distribution in the context of IoT-based smart cities9
Provably secure biometric-based client–server secure communication over unreliable networks9
ASSBert: Active and semi-supervised bert for smart contract vulnerability detection9
Robust Lightweight Privacy-Preserving and Session Scheme Interrogation for Fog Computing Systems9
An efficient multimedia compression-encryption scheme using latin squares for securing Internet-of-things networks9
Effective charging identity authentication scheme based on fog computing in V2G networks8
An end-to-end screen shooting resilient blind watermarking scheme for medical images8
A secure gray-scale image watermarking technique in fractional DCT domain using zig-zag scrambling8
A chaotic image encryption scheme based on multi-directional confusion and diffusion operations8
Fuzzy extraction and PUF based three party authentication protocol using USB as mass storage device8
Spatiotemporal chaos in multiple dynamically coupled map lattices and its application in a novel image encryption algorithm8
Secure Blockchain-Internet of Vehicles (B-IoV) Mechanism using DPSO and M-ITA Algorithms8
Pencil shell matrix based image steganography with elevated embedding capacity8
An efficient and practical approach for privacy-preserving Naive Bayes classification8
PUF enable lightweight key-exchange and mutual authentication protocol for multi-server based D2D communication8
Dynamic secure multi-keyword ranked search over encrypted cloud data8
B-DAC: A decentralized access control framework on Northbound interface for securing SDN using blockchain8
Multi-class privacy-preserving cloud computing based on compressive sensing for IoT8
An examination of susceptibility to spear phishing cyber attacks in non-English speaking communities8
ECB2: A novel encryption scheme using face biometrics for signing blockchain transactions8
PB-3PAKA: Password-based three-party authenticated key agreement protocol for mobile devices in post-quantum environments8
A blockchain-based keyword search scheme with dual authorization for electronic health record sharing8
Secure mobile internet voting system using biometric authentication and wavelet based AES8
Attribute-based access control scheme for data sharing on hyperledger fabric8
Image encryption approach using improved chaotic system incorporated with differential evolution and genetic algorithm8
Towards a secure ITS: Overview, challenges and solutions7
ECQV-IBI: Identity-based identification with implicit certification7
Insights into security and privacy issues in smart healthcare systems based on medical images7
The evolution of Mirai botnet scans over a six-year period7
Robust image watermarking algorithm using chaotic sequences7
I-CIFA: An improved collusive interest flooding attack in named data networking7
Distinguishing natural and computer generated images using Multi-Colorspace fused EfficientNet7
NEDetector: Automatically extracting cybersecurity neologisms from hacker forums7
A real-time related key attack on the WG-16 stream cipher for securing 4G-LTE networks7
A data-driven network intrusion detection system using feature selection and deep learning7
Insider-threat detection: Lessons from deploying the CITD tool in three multinational organisations7
Low-rate DoS attack detection method based on hybrid deep neural networks7
A novel privacy-preserving multi-level aggregate signcryption and query scheme for Smart Grid via mobile fog computing7
Addressing insider attacks via forensic-ready risk management7
An ensemble learning approach for anomaly detection in credit card data with imbalanced and overlapped classes7
End-to-end secure group communication for the Internet of Things7
Collusion resistant secret sharing scheme for secure data storage and processing over cloud7
A new lattice-based authentication scheme for IoT7
A fuzzy Dempster–Shafer classifier for detecting Web spams7
Adversarial attacks by attaching noise markers on the face against deep face recognition7
KAPRE: Key-aggregate proxy re-encryption for secure and flexible data sharing in cloud storage7
Extending STPA with STRIDE to identify cybersecurity loss scenarios7
New key management scheme based on pool-hash for WSN and IoT7
Secure sparse watermarking on DWT-SVD for digital images7
A novel exponential one-dimensional chaotic map enhancer and its application in an image encryption scheme using modified ZigZag transform7
Personal information: Perceptions, types and evolution6
ME-Box: A reliable method to detect malicious encrypted traffic6
Permission-based Android malware analysis by using dimension reduction with PCA and LDA6
Improved differential attacks on the reduced-round SNOW-V and SNOW-Vi stream cipher6
TPEIP: Thumbnail preserving encryption based on sum preserving for image privacy6
Access control mechanism for the Internet of Things based on blockchain and inner product encryption6
SeizeMaliciousURL: A novel learning approach to detect malicious URLs6
A blockchain based secure communication framework for community interaction6
4D chaotic system-based secure data hiding method to improve robustness and embedding capacity of videos6
SEA-BREW: A scalable Attribute-Based Encryption revocable scheme for low-bitrate IoT wireless networks6
Dynamic threshold ECDSA signature and application to asset custody in blockchain6
A secure cross-domain authentication scheme with perfect forward security and complete anonymity in fog computing6
A lightweight certificateless authentication scheme and group key agreement with dynamic updating mechanism for LTE-V-based internet of vehicles in smart cities6
Fast3DS: A real-time full-convolutional malicious domain name detection system6
Improving RFID/IoT-based generalized ultra-lightweight mutual authentication protocols6
Mapping based Residual Convolution Neural Network for Non-embedding and Blind Image Watermarking6
A mutual authentication scheme for establishing secure device-to-device communication sessions in the edge-enabled smart cities6
AI@nti-Malware: An intelligent framework for defending against malware attacks6
IMCLNet: A lightweight deep neural network for Image-based Malware Classification6
An Efficient Dual-image Reversible Data Hiding Scheme Based on Exploiting Modification Direction6
An efficient pattern-based approach for insider threat classification using the image-based feature representation6
Intrusion detection framework based on causal reasoning for DDoS6
A method for decrypting data infected with Hive ransomware6
A Deep Learning Ensemble Approach to Detecting Unknown Network Attacks6
Enhanced (n, n)-threshold QR code secret sharing scheme based on error correction mechanism6
Efficient data hiding method for videos based on adaptive inverted LSB332 and secure frame selection with enhanced Vigenere cipher6
A secure and energy efficient key agreement framework for vehicle-grid system6
On the effectiveness of binary emulation in malware classification6
Secret data sharing through coverless video steganography based on bit plane segmentation6
Function-level obfuscation detection method based on Graph Convolutional Networks6
Towards AI forensics: Did the artificial intelligence system do it?5
Adaptive to pixel value and pixel value difference irreversible spatial data hiding method using modified LSB for grayscale images5
SBRAC: Blockchain-based sealed-bid auction with bidding price privacy and public verifiability5
Multi-party transaction framework for drone services based on alliance blockchain in smart cities5
BP-AKAA: Blockchain-enforced Privacy-preserving Authentication and Key Agreement and Access Control for IIoT5
A new anonymous authentication framework for secure smart grids applications5
Quaternion with quantum walks for designing a novel color image cryptosystem5
A certificateless signature for multi-source network coding5
Reversible data hiding in encrypted images using block-based adaptive MSBs prediction5
Application design phase risk assessment framework using cloud security domains5
Exposing the darkness within: A review of dark personality traits, models, and measures and their relationship to insider threats5
Verifiable and auditable authorizations for smart industries and industrial Internet-of-Things5
Implementation and evaluation of a privacy-preserving distributed ABC scheme based on multi-signatures5
LWR-based Quantum-Safe Pseudo-Random Number Generator5
Practical dynamic group signature with efficient concurrent joins and batch verifications5
0.071673154830933