Journal of Information Security and Applications

Papers
(The median citation count of Journal of Information Security and Applications is 2. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2021-11-01 to 2025-11-01.)
ArticleCitations
Editorial Board117
Robust zero-watermarking algorithm via multi-scale feature analysis for medical images71
Detection of Evasive Android Malware Using EigenGCN52
Merkle multi-branch hash tree-based dynamic data integrity auditing for B5G network cloud storage50
Robust watermarking based on optimal synchronization signal45
Improving data extraction accuracy for median filter-based data hiding method41
DRAC: A dynamic fine-grained access control scheme for cloud storage with censorship-coerced resistance41
Understanding practitioner perspectives on using privacy harm categories for privacy risk assessment39
Statistical privacy protection for secure data access control in cloud36
A lightweight intrusion detection system for connected autonomous vehicles based on ECANet and image encoding33
Editorial Board33
Refined statistical attacks against searchable symmetric encryption using non-indexed documents32
Current approaches and future directions for Cyber Threat Intelligence sharing: A survey32
Lightweight privacy-preserving authenticated key agreements using physically unclonable functions for internet of drones32
Smart contracts vulnerability detection model based on adversarial multi-task learning29
The reality of backdoored S-Boxes—An eye opener28
Synergistic compensation for RGB-based blind color image watermarking to withstand JPEG compression28
PGAN framework for synthesizing sensor data privately27
Distinguishing and key recovery attacks on the reduced-round SNOW-V and SNOW-Vi26
Incorporating deep learning into capacitive images for smartphone user authentication26
A deep learning assisted personalized deception system for countering web application attacks25
Bane or Boon: Measuring the effect of evasive malware on system call classifiers25
A novel 5-bit S-box design for lightweight cryptography algorithms25
Impossible differential cryptanalysis of FBC-12824
Plaintext recovery and tag guessing attacks on authenticated encryption algorithm COLM23
Maaker: A framework for detecting and defeating evasion techniques in Android malware22
Implementation and evaluation of a privacy-preserving distributed ABC scheme based on multi-signatures22
PVO-based reversible data hiding using bit plane segmentation and pixel expansion21
SBRAC: Blockchain-based sealed-bid auction with bidding price privacy and public verifiability21
NeuroIDBench: An open-source benchmark framework for the standardization of methodology in brainwave-based authentication research20
A different base approach for better efficiency on range proofs20
SDT-CNN-based network security situation awareness20
Puncturable-based broadcast encryption with tracking for preventing malicious encryptors in cloud file sharing20
A statistical verification method of random permutations for hiding countermeasure against side-channel attacks20
GuardFS: A file system for integrated detection and mitigation of Linux-based ransomware20
Deep GraphSAGE enhancements for intrusion detection: Analyzing attention mechanisms and GCN integration19
FRAPE: A Framework for Risk Assessment, Prioritization and Explainability of vulnerabilities in cybersecurity19
High payload H.266/Versatile Video Coding (VVC) steganography based on affine motion estimation and chaotic maps19
A novel blockchain-based anonymous roaming authentication scheme for VANET19
Adversarial feature generation for ML-based intrusion detection in the petrochemical industry19
Novel Hybrid Model for Intrusion Prediction on Cyber Physical Systems’ Communication Networks based on Bio-inspired Deep Neural Network Structure18
A new anonymous authentication framework for secure smart grids applications18
Exposing the darkness within: A review of dark personality traits, models, and measures and their relationship to insider threats18
Towards a robust and trustworthy machine learning system development: An engineering perspective18
A perspective trend of hyperelliptic curve cryptosystem for lighted weighted environments18
Generalized implicit-key attacks on RSA17
Editorial Board17
A one-time-pad-like chaotic image encryption scheme using data steganography17
A provably secure collusion-resistant identity-based proxy re-encryption scheme based on NTRU17
An adaptable deep learning-based intrusion detection system to zero-day attacks17
A novel model for voice command fingerprinting using deep learning17
Editorial Board17
Securing emergent behaviour in swarm robotics17
An information-theoretically secure quantum multiparty private set intersection17
PARGMF: A provenance-enabled automated rule generation and matching framework with multi-level attack description model17
A (k, n) secret document sharing with meaningful shares16
Lightweight capability-token for consent-based authentication protocol for smart sensor nodes16
A novel key and image concealing with static-dynamic pattern using modified periodic table16
Permission-based Android malware analysis by using dimension reduction with PCA and LDA16
Assessing cyber threats for storyless systems15
Subject Data Auditing via Source Inference Attack in Cross-Silo Federated Learning15
LR-CAKA: A leakage-resilient compatible authenticated key agreement protocol for heterogeneous public-key cryptosystems15
Moiré pattern generation-based image steganography15
Multi-mediated semi-quantum key distribution protocol with cyclic topology15
Fed-HA: A Privacy-Preserving Robust Federated Learning Scheme based on Homomorphic Assessment15
SoK: Systematic analysis of adversarial threats against deep learning approaches for autonomous anomaly detection systems in SDN-IoT networks15
A tenant-aware deep learning-based intrusion detection system for detecting DDoS attacks in multi-tenant SaaS networks14
Host-based intrusion detection with multi-datasource and deep learning14
Real-time Automotive Ethernet Intrusion Detection Using Sliding Window-Based Temporal Convolutional Residual Attention Networks14
A hybrid-trust-based emergency message dissemination model for vehicular ad hoc networks14
FP-growth-based signature extraction and unknown variants of DoS/DDoS attack detection on real-time data stream14
Dynamic-anonymous privacy-preserving authenticated aggregation for safety-warning system for the Internet of Vehicles14
A high-accuracy phishing website detection method based on machine learning14
Through the static: Demystifying malware visualization via explainability14
A lattice-based group signature with backward unlinkability for medical blockchain systems14
Nash mixed detection strategy of multi-type network attack based on zero-sum stochastic game13
A distributed privacy-preserving data aggregation scheme for smart grid with fine-grained access control13
Differential privacy performance evaluation under the condition of non-uniform noise distribution13
Enabling anonymized open-data linkage by authorized parties13
Secure server-aided attribute-based signature with perfect anonymity for cloud-assisted systems13
On the feasibility of E2E verifiable online voting – A case study from Durga Puja trial13
A designated tester-based certificateless public key encryption with conjunctive keyword search for cloud-based MIoT in dynamic multi-user environment13
You are what the permissions told me! Android malware detection based on hybrid tactics13
AUKA: Asynchronous updatable key agreement for edge-based mobile crowd sensing12
Personal information: Perceptions, types and evolution12
Hierarchical Threshold Multi-Key Fully Homomorphic Encryption12
A secure and efficient face template protection scheme based on chaos12
BridgeSec: Facilitating effective communication between security engineering and systems engineering12
Disposable identities: Solving web tracking12
A privacy protection scheme for biological characteristics based on 4D hyperchaos and matrix transformation12
Corrigendum to “An extended Attribute-based access control with controlled delegation in IoT” [Journal of Information Systems and Applications 76 (2023) 103473]12
A novel scheme to encrypting autonomous driving scene point clouds based on optical chaos12
Real-time monitoring model of DDoS attacks using distance thresholds in Edge cooperation networks12
Fed-LSAE: Thwarting poisoning attacks against federated cyber threat detection system via Autoencoder-based latent space inspection12
A hybrid BTP approach with filtered BCH codes for improved performance and security12
Adversarial watermark: A robust and reliable watermark against removal12
An anonymous verifiable random function with unbiasability and constant size proof12
Enhancing privacy-preserving machine learning with self-learnable activation functions in fully homomorphic encryption12
SoK: The design paradigm of safe and secure defaults12
Hiding speech in music files11
A consumer-centered security framework for sharing health data in social networks11
Lightweight certificate revocation for low-power IoT with end-to-end security11
Image-based malware representation approach with EfficientNet convolutional neural networks for effective malware classification11
Detection of identity swapping attacks in low-resolution image settings11
AB-FGSM: AdaBelief optimizer and FGSM-based approach to generate adversarial examples11
Anonymous and lightweight secure authentication protocol for mobile Agent system11
A dependable hybrid machine learning model for network intrusion detection11
Certificate-based authenticated encryption with keyword search: Enhanced security model and a concrete construction for Internet of Things11
4D chaotic system-based secure data hiding method to improve robustness and embedding capacity of videos11
Editorial Board11
Secure sparse watermarking on DWT-SVD for digital images11
Lattice-based puncturable blind signature scheme: Enhancing privacy and security in large language models10
A quantum resistant multi-user signcryption scheme featuring key invisibility for Internet of Things10
Privacy-preserving and verifiable multi-task data aggregation for IoT-based healthcare10
A feature vector-based modeling attack method on symmetrical obfuscated interconnection PUF10
On the modeling of cyber-attacks associated with social engineering: A parental control prototype10
Homomorphic additive lightweight block cipher scheme for securing IoT applications10
Secure outsourced decryption for FHE-based privacy-preserving cloud computing10
Improved neural distinguishers with multi-round and multi-splicing construction10
A comprehensive survey of automated Advanced Persistent Threat attribution: Taxonomy, methods, challenges and open research problems10
Reversible data hiding in encrypted image using two-pass pixel value ordering10
A novel approach for malicious URL detection using RoBERTa and sparse autoencoder10
Classification of random number generator applications in IoT: A comprehensive taxonomy10
TIM: Secure and usable authentication for smartphones10
Vertin: Fast, Communication-friendly and Key-compact secure inference system for NNs and LLMs10
Detection of intranet scanning traffic and tool detection based on multi-feature fusion10
Editorial Board10
An efficient cheating-detectable secret image sharing scheme with smaller share sizes10
Efficient verifiable secure aggregation protocols for federated learning10
A general framework for high-dimension data secure aggregation with resilience to dropouts10
A group key agreement protocol based on ECDH and short signature10
Color image encryption algorithm based on hybrid chaos and layered strategies10
LSPR23: A novel IDS dataset from the largest live-fire cybersecurity exercise10
A secure and effective image encryption scheme by combining parallel compressed sensing with secret sharing scheme9
HTTP request pattern based signatures for early application layer DDoS detection: A firewall agnostic approach9
Local Search Trajectories over S-box space9
Addressing insider attacks via forensic-ready risk management9
Semi-supervised QIM steganalysis with ladder networks9
Secure multi-factor access control mechanism for pairing blockchains9
WiCapose: Multi-modal fusion based transparent authentication in mobile environments9
Performance analysis of a parameterized minutiae-based approach for securing fingerprint templates in biometric authentication systems9
Scan-free verifiable public-key searchable encryption supporting efficient user updates in distributed systems9
Visualization-based comprehensive feature representation with improved EfficientNet for malicious file and variant recognition9
A Pairing-free Dynamic Multi-receiver Certificateless Authenticated Searchable Encryption for cloud storage9
Blockchain-based decentralized architecture for cloud storage system9
Locally optimum image watermark detector based on statistical modeling of SWT-EFMs magnitudes9
Automated enumeration of block cipher differentials: An optimized branch-and-bound GPU framework9
Multi-party anonymous authentication scheme in heterogeneous network slicing9
A multi-label network attack detection approach based on two-stage model fusion9
Deepfakes in digital media forensics: Generation, AI-based detection and challenges9
A novel method to generate key-dependent s-boxes with identical algebraic properties8
Formal verification of a V2X scheme mixing traditional PKI and group signatures8
Statistical image watermark decoder using NSM-HMT in NSCT-FGPCET magnitude domain8
A novel link fabrication attack detection method for low-latency SDN networks8
A lightweight hierarchical key management approach for internet of things8
Isogeny computation on Kummer lines and applications8
A generic cryptographic algorithm identification scheme based on ciphertext features8
Non-additive image steganographic framework based on variational inference in Markov Random Fields8
A semi-centralized key agreement protocol integrated multiple security communication techniques for LLM-based autonomous driving system8
Cryptographic primitives based on compact knapsack problem8
A security model to protect the isolation of medical data in the cloud using hybrid cryptography8
An intrusion tolerant identity provider with user attributes confidentiality8
Robust image hashing based on multi-view dimension reduction8
VHNet: A Video Hiding Network with robustness to video coding8
Fractional salp swarm algorithm: An association rule based privacy-preserving strategy for data sanitization8
Designing energy-aware collaborative intrusion detection in IoT networks8
Editorial Board8
IDHG-ECC-integrated Diffie Hellman Galois–elliptic-curve cryptography for enhancing EHR data security8
Secure information processing for multimedia forensics using zero-trust security model for large scale data analytics in SaaS cloud computing environment8
A privacy-preserving cross-media retrieval on encrypted data in cloud computing8
Modeling and physical attack resistant authentication protocol with double PUFs8
PSDCLS: Parallel simultaneous diffusion–confusion image cryptosystem based on Latin square8
From the detection towards a pyramidal classification of terrorist propaganda8
Role mining under User-Distribution cardinality constraint7
RiderAuth: A cancelable touch-signature based rider authentication scheme for driverless taxis7
Post-quantum identity-based traitor tracing7
Compression-robust detection of Motion-Compensated Frame Interpolation using Discrete Cosine Transform in logarithm domain7
LWR-based Quantum-Safe Pseudo-Random Number Generator7
Practical dynamic group signature with efficient concurrent joins and batch verifications7
A tradeoff paradigm shift in cryptographically-secure pseudorandom number generation based on discrete logarithm7
Security implications of user non-compliance behavior to software updates: A risk assessment study7
A cross-architecture malware detection approach based on intermediate representation7
ppLeader: Achieving the Privacy-Preserving Leaders in PoS Protocols7
Insights into security and privacy issues in smart healthcare systems based on medical images7
VMC2-PS: Bloc7
A Deep Learning Ensemble Approach to Detecting Unknown Network Attacks7
RPCP-PURI: A robust and precise computational predictor for Phishing Uniform Resource Identification7
Forensic analysis of web browsers lifecycle: A case study7
Multi-ciphertext equality test heterogeneous signcryption scheme based on location privacy7
A detector for Android repackaged applications with layout-fingerprint7
A novel privacy-preserving multi-level aggregate signcryption and query scheme for Smart Grid via mobile fog computing7
A multiclass hybrid approach to estimating software vulnerability vectors and severity score7
Privacy-preserving model for biometric-based authentication and Key Derivation Function7
Victimization in DDoS attacks: The role of popularity and industry sector7
Bargaining game theoretical analysis framework for ransomware attacks7
Robust clustering federated learning with trusted anchor clients7
SVScanner: Detecting smart contract vulnerabilities via deep semantic extraction7
Implementation of face recognition system using BioCryptosystem as template protection scheme7
Digital image steganalysis using entropy driven deep neural network7
Multi-datasource machine learning in intrusion detection: Packet flows, system logs and host statistics7
A time-efficient and noise-resistant cryptosystem based on discrete wavelet transform and chaos theory: An application in image encryption7
Editorial Board7
Anti-pruning multi-watermarking for ownership proof of steganographic autoencoders7
Verifiable quaternion fully homomorphic encryption scheme for mitigating false data injection attacks by privacy preservation in fog environment7
EO-PSI-CA: Efficient outsourced private set intersection cardinality7
Improved biometric data protection: Bounded brute-force strategy for maximum likelihood decoding7
QMDS:QKD-based multi-index data secure sharing solution on blockchain7
A screen-shooting resilient data-hiding algorithm based on two-level singular value decomposition7
GwPFV: A novel packet forwarding verification mechanism based on gateways in SDN-based storage environment6
Spatio-temporal representation learning enhanced source cell-phone recognition from speech recordings6
Editorial Board6
Enabling privacy-preserving medication analysis in distributed EHR systems6
Improved Sine-Tangent chaotic map with application in medical images encryption6
Neurosymbolic AI for network intrusion detection systems: A survey6
Quaternion with quantum walks for designing a novel color image cryptosystem6
Editorial Board6
Enhancing android malware detection explainability through function call graph APIs6
VSTNet: Robust watermarking scheme based on voxel space transformation for diffusion tensor imaging images6
An improved privacy attack on smartphones exploiting the accelerometer6
CyberROAD: A cybersecurity risk assessment ontology for automotive domain aligned with ISO/SAE 21434:20216
Enhancing robustness in video data hiding against recompression with a wide parameter range6
A constant round quantum secure protocol for oblivious polynomial evaluation6
PB-3PAKA: Password-based three-party authenticated key agreement protocol for mobile devices in post-quantum environments6
A lightweight certificateless authentication scheme and group key agreement with dynamic updating mechanism for LTE-V-based internet of vehicles in smart cities6
Mobile applications identification using autoencoder based electromagnetic side channel analysis6
Efficient quantum algorithms to break group ring cryptosystems6
A nano-design of image masking and steganography structure based on quantum technology6
A new lattice-based authentication scheme for IoT6
Protecting metadata privacy in blockchain-based EHR systems: A group addressing structure6
DAG blockchain-based lightweight authentication and authorization scheme for IoT devices6
Improved mixture differential attacks on 6-round AES-like ciphers towards time and data complexities6
High-throughput block cipher implementations with SIMD6
Corrigendum to ‘A novel sophisticated hybrid method for intrusion detection using the artificial immune system’6
A heterogeneous signcryption scheme with Cryptographic Reverse Firewalls for IoT and its application6
Implementing and evaluating a GDPR-compliant open-source SIEM solution6
SGX-Stream: A Secure Stream Analytics Framework In SGX-enabled Edge Cloud6
Security analysis of the Classic McEliece, HQC and BIKE schemes in low memory6
GRAMSSAT: An efficient label inference attack against two-party split learning based on gradient matching and semi-supervised learning6
Enabling security risk assessment and management for business process models6
Keeping classical distinguisher and neural distinguisher in balance6
RNN for intrusion detection in digital substations based on the IEC 618506
An efficient and practical approach for privacy-preserving Naive Bayes classification6
ZeroMT: Towards Multi-Transfer transactions with privacy for account-based blockchain6
DroidTTP: Mapping android applications with TTP for Cyber Threat Intelligence6
Efficient identity-based traceable cloud data broadcasting with outsider anonymity and simultaneous individual transmission6
CovertSYS: A systematic covert communication approach for providing secure end-to-end conversation via social networks6
Dual adversarial attacks: Fooling humans and classifiers6
A study on implementing the BLAS interface in the MPC context6
Simple and efficient threshold changeable secret sharing6
AnoGLA: An efficient scheme to improve network anomaly detection5
0.16546082496643