Journal of Information Security and Applications

Papers
(The TQCC of Journal of Information Security and Applications is 5. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2021-02-01 to 2025-02-01.)
ArticleCitations
An authentication scheme for color images with grayscale invariance and recoverability using image demosaicing81
HierFedPDP:Hierarchical federated learning with personalized differential privacy63
Detection of Evasive Android Malware Using EigenGCN58
Profiled side channel attacks against the RSA cryptosystem using neural networks57
Authentication of rotogravure print-outs using a regular test pattern50
An efficient differential fault attack against SIMON key schedule48
Reversible transformation of tetrahedral mesh models for data protection and information hiding43
A deep learning assisted personalized deception system for countering web application attacks41
Security analysis of menstruation cycle tracking applications using static, dynamic and machine learning techniques40
Editorial Board39
EO-PSI-CA: Efficient outsourced private set intersection cardinality37
Security policies by design in NoSQL document databases35
Editorial Board35
Certificateless multi-source elliptic curve ring signcryption for cloud computing35
Editorial Board34
Two-party interactive secure deduplication with efficient data ownership management in cloud storage31
(k, n) secret image sharing scheme with privileged set31
A tradeoff paradigm shift in cryptographically-secure pseudorandom number generation based on discrete logarithm30
Distributed auditing protocol for untraceable transactions29
PSEEMV: Provably secure and efficient emergency message verification scheme based on ECC and CRT for Space Information Network28
BP-AKAA: Blockchain-enforced Privacy-preserving Authentication and Key Agreement and Access Control for IIoT28
V-A3tS: A rapid text steganalysis method based on position information and variable parameter multi-head self-attention controlled by length26
A detector for Android repackaged applications with layout-fingerprint25
SNN-PPRL: A secure record matching scheme based on siamese neural network25
Anti-pruning multi-watermarking for ownership proof of steganographic autoencoders25
Two statistical traffic features for certain APT group identification24
Robust image watermarking algorithm using chaotic sequences24
A motional but temporally consistent physical video examples23
Impossible differential cryptanalysis of FBC-12823
Robustness enhancement against adversarial steganography via steganalyzer outputs23
CVTStego-Net: A convolutional vision transformer architecture for spatial image steganalysis22
Cryptanalysis of an image encryption scheme based on two-point diffusion strategy and Henon map22
Plaintext recovery and tag guessing attacks on authenticated encryption algorithm COLM21
Understanding the effects of situational crime prevention and personality factors on insider compliance21
Editorial Board21
A post-quantum signcryption scheme using isogeny based cryptography21
Distributed secret sharing scheme based on the high-dimensional rotation paraboloid20
Describing correct UAVs cooperation architectures applied on an anti-terrorism scenario20
Deniable search of encrypted cloud-storage data20
KAPRE: Key-aggregate proxy re-encryption for secure and flexible data sharing in cloud storage19
Refined statistical attacks against searchable symmetric encryption using non-indexed documents19
Preserving authentication and availability security services through Multivariate Statistical Network Monitoring19
Practical dynamic group signature with efficient concurrent joins and batch verifications19
Secure encryption key management as a SecaaS based on Chinese wall security policy19
Introduction to the special issue on privacy and security for location-based services and devices19
PVO-based reversible data hiding using bit plane segmentation and pixel expansion19
Synergistic compensation for RGB-based blind color image watermarking to withstand JPEG compression18
A new Private Mutual Authentication scheme with group discovery18
The reality of backdoored S-Boxes—An eye opener18
FSDS: A practical and fully secure document similarity search over encrypted data with lightweight client17
Privacy-preserving outsourcing decision tree evaluation from homomorphic encryption17
PSCPAC: Post-quantum secure certificateless public auditing scheme in cloud storage16
Special issue on risk and security of smart systems16
Image data security using Quasigroup combined with Fibonacci Q-transformation16
Does the layout of the Android unlock pattern affect the security and usability of the password?15
PGAN framework for synthesizing sensor data privately15
A multiclass hybrid approach to estimating software vulnerability vectors and severity score15
A modified secure hash design to circumvent collision and length extension attacks15
Verifiable quaternion fully homomorphic encryption scheme for mitigating false data injection attacks by privacy preservation in fog environment15
A novel privacy-preserving multi-level aggregate signcryption and query scheme for Smart Grid via mobile fog computing14
A risk-aware and recommender distributed intrusion detection system for home robots14
A semantic element representation model for malicious domain name detection14
Fuzzy-CNN: Improving personal human identification based on IRIS recognition using LBP features14
A lightweight privacy-preserving truth discovery in mobile crowdsensing systems13
A mutual authentication scheme for establishing secure device-to-device communication sessions in the edge-enabled smart cities13
A secure recharge scheme for blockchain payment channels13
GAIN: Decentralized Privacy-Preserving Federated Learning13
TPPSUPPLY : A traceable and privacy-preserving blockchain system architecture for the supply chain13
A provably secure multi-server authentication scheme based on Chebyshev chaotic map13
Security model for protecting intellectual property of state-of-the-art microfluidic biochips13
Shape-driven lightweight CNN for finger-vein biometrics13
A screen-shooting resilient data-hiding algorithm based on two-level singular value decomposition13
DDoS attack resisting authentication protocol for mobile based online social network applications13
Current approaches and future directions for Cyber Threat Intelligence sharing: A survey13
Bottom-boosting differential evolution based digital image security analysis13
A novel 5-bit S-box design for lightweight cryptography algorithms13
Maaker: A framework for detecting and defeating evasion techniques in Android malware13
Role mining under User-Distribution cardinality constraint13
Classified data authentication scheme for IoT based on aggregate signature and Hyperledger Fabric12
Multi-party transaction framework for drone services based on alliance blockchain in smart cities12
A vision transformer-based automated human identification using ear biometrics12
Privacy preservation in Distributed Deep Learning: A survey on Distributed Deep Learning, privacy preservation techniques used and interesting research directions12
A novel DNA tree-based chaotic image encryption algorithm12
A novel compression-based 2D-chaotic sine map for enhancing privacy and security of biometric identification systems12
SeizeMaliciousURL: A novel learning approach to detect malicious URLs12
An efficient mutual authentication and privacy prevention scheme for e-healthcare monitoring12
Detection and mitigation of fraudulent resource consumption attacks in cloud using deep learning approach12
Deep learning-based biometric image feature extraction for securing medical images through data hiding and joint encryption–compression12
Detection of malicious Android applications using Ontology-based intelligent model in mobile cloud environment11
Distinguishing and key recovery attacks on the reduced-round SNOW-V and SNOW-Vi11
Quantum Reversible Audio Steganalysis Using Quantum Schmidt Decomposition and Quantum Support Vector Machine11
A pseudo-random bit generator based on chaotic maps enhanced with a bit-XOR operation11
My data, my control: A secure data sharing and access scheme over blockchain11
AI@TSS- Intelligent technical support scam detection system11
Trust and priority-based drone assisted routing and mobility and service-oriented solution for the internet of vehicles networks11
Privacy-preserving model for biometric-based authentication and Key Derivation Function11
Mapping based Residual Convolution Neural Network for Non-embedding and Blind Image Watermarking11
Verifiable online/offline multi-keyword search for cloud-assisted Industrial Internet of Things11
OCR post-correction for detecting adversarial text images11
Dead or alive: Discovering server HTTP endpoints in both reachable and dead client-side code11
An efficient multimedia compression-encryption scheme using latin squares for securing Internet-of-things networks11
LWR-based Quantum-Safe Pseudo-Random Number Generator10
Incorporating deep learning into capacitive images for smartphone user authentication10
SBRAC: Blockchain-based sealed-bid auction with bidding price privacy and public verifiability10
Novel lightweight RFID authentication protocols for inexpensive tags10
Dynamic secure multi-keyword ranked search over encrypted cloud data10
Implementation and evaluation of a privacy-preserving distributed ABC scheme based on multi-signatures10
Adversarial attacks by attaching noise markers on the face against deep face recognition10
Editorial Board10
A novel link fabrication attack detection method for low-latency SDN networks10
Reversible data hiding in encrypted images using block-based adaptive MSBs prediction10
A large-scale analysis of Wi-Fi passwords10
On the construction of a post-quantum blockchain for smart city10
SVScanner: Detecting smart contract vulnerabilities via deep semantic extraction10
Statistical privacy protection for secure data access control in cloud10
IFKMS: Inverse Function-based Key Management Scheme for IoT networks10
The differential fault analysis on block cipher KLEIN-9610
The robustness of behavior-verification-based slider CAPTCHAs10
Bane or Boon: Measuring the effect of evasive malware on system call classifiers10
A memristive RLC oscillator dynamics applied to image encryption10
Flaw and amendment of a two-party authenticated key agreement protocol for post-quantum environments10
A secure and lightweight anonymous mutual authentication scheme for wearable devices in Medical Internet of Things9
Cryptographic primitives based on compact knapsack problem9
Certificateless ring signature from NTRU lattice for electronic voting9
A robust and lossless commutative encryption and watermarking algorithm for vector geographic data9
Image encryption algorithm based on improved Zigzag transformation and quaternary DNA coding9
Efficient data hiding method for videos based on adaptive inverted LSB332 and secure frame selection with enhanced Vigenere cipher9
Low-rate DoS attack detection method based on hybrid deep neural networks9
Enhancing logistic chaotic map for improved cryptographic security in random number generation9
Secure AAC steganography scheme based on multi-view statistical distortion (SofMvD)9
IP packet-level encrypted traffic classification using machine learning with a light weight feature engineering method9
Partial palm vein based biometric authentication9
Android malware detection based on a novel mixed bytecode image combined with attention mechanism9
A differential privacy based multi-stage network fingerprinting deception game method9
Access control mechanism for the Internet of Things based on blockchain and inner product encryption9
An efficient feature selection and explainable classification method for EEG-based epileptic seizure detection9
A time-efficient and noise-resistant cryptosystem based on discrete wavelet transform and chaos theory: An application in image encryption9
Smart contracts vulnerability detection model based on adversarial multi-task learning8
QS-Auth: A Quantum-secure mutual authentication protocol based on PUF and Post-Quantum Signature for Heterogeneous Delay-Tolerant Networks8
BloAC8
Efficient and secure substitution box and random number generators over Mordell elliptic curves8
Adaptive to pixel value and pixel value difference irreversible spatial data hiding method using modified LSB for grayscale images8
Attribute-based access control scheme for data sharing on hyperledger fabric8
4D mixed chaotic system and its application to RGB image encryption using substitution-diffusion8
Lightweight privacy-preserving authenticated key agreements using physically unclonable functions for internet of drones8
NeuroIDBench: An open-source benchmark framework for the standardization of methodology in brainwave-based authentication research8
A lightweight and provable secure identity-based generalized proxy signcryption (IBGPS) scheme for Industrial Internet of Things (IIoT)8
A secure and energy efficient key agreement framework for vehicle-grid system8
Efficient binary diffusion matrix structures for dynamic key-dependent cryptographic algorithms8
A low-rate DDoS detection and mitigation for SDN using Renyi Entropy with Packet Drop8
Blockchain-based public key encryption with keyword search for medical data sharing in cloud environment8
The evolution of Mirai botnet scans over a six-year period8
Insights into security and privacy issues in smart healthcare systems based on medical images8
Bi-GISIS KE: Modified key exchange protocol with reusable keys for IoT security7
Multi-keyword ranked search with access control for multiple data owners in the cloud7
Improving RFID/IoT-based generalized ultra-lightweight mutual authentication protocols7
A method of classifying IoT devices based on attack sensitivity7
Assessing cyber threats for storyless systems7
Corrigendum to “An extended Attribute-based access control with controlled delegation in IoT” [Journal of Information Systems and Applications 76 (2023) 103473]7
Fast3DS: A real-time full-convolutional malicious domain name detection system7
A (k, n) secret document sharing with meaningful shares7
Secure memory erasure in the presence of man-in-the-middle attackers7
TPEIP: Thumbnail preserving encryption based on sum preserving for image privacy7
Digital image steganalysis using entropy driven deep neural network7
Secure mobile internet voting system using biometric authentication and wavelet based AES7
A fuzzy Dempster–Shafer classifier for detecting Web spams7
Improved Sine-Tangent chaotic map with application in medical images encryption7
DAG blockchain-based lightweight authentication and authorization scheme for IoT devices7
Network coding and MPTCP: Enhancing security and performance in an SDN environment7
DTMIC: Deep transfer learning for malware image classification7
Adaptive HEVC video steganography based on distortion compensation optimization7
Towards a robust and trustworthy machine learning system development: An engineering perspective7
Multi-datasource machine learning in intrusion detection: Packet flows, system logs and host statistics7
A study on priming methods for graphical passwords7
A novel key and image concealing with static-dynamic pattern using modified periodic table7
Enhanced (n, n)-threshold QR code secret sharing scheme based on error correction mechanism7
Dual adversarial attacks: Fooling humans and classifiers6
Generalized implicit-key attacks on RSA6
Editorial Board6
Robust Lightweight Privacy-Preserving and Session Scheme Interrogation for Fog Computing Systems6
Improved mixture differential attacks on 6-round AES-like ciphers towards time and data complexities6
Efficient identity-based traceable cloud data broadcasting with outsider anonymity and simultaneous individual transmission6
A comprehensive analysis combining structural features for detection of new ransomware families6
Editorial Board6
Wildcarded identity-based ring signatures based on linearly homomorphic signatures6
An improved privacy attack on smartphones exploiting the accelerometer6
Android mobile malware detection using fuzzy AHP6
A dynamic feature selection technique to detect DDoS attack6
Blockchain for edge-enabled smart cities applications6
Intelligent operator: Machine learning based decision support and explainer for human operators and service providers in the fog, cloud and edge networks6
A party-adaptive variant of LowGear6
A provably secure collusion-resistant identity-based proxy re-encryption scheme based on NTRU6
Trustworthy adaptive adversarial perturbations in social networks6
Robust detection of seam carving with low ratio via pixel adjacency subtraction and CNN-based transfer learning6
Verifiable (t, n) Secret Image Sharing Scheme Based on Slim Turtle Shell Matrix6
Conditional privacy-preserving authentication scheme for V2V communication without pseudonyms6
High-throughput block cipher implementations with SIMD6
A SM2 based efficient and lightweight batch verification approach for IC cards6
VSTNet: Robust watermarking scheme based on voxel space transformation for diffusion tensor imaging images6
An efficient quantum-resistant undeniable signature protocol for the E-voting system6
Design of ideal secret sharing based on new results on representable quadripartite matroids6
PUF enable lightweight key-exchange and mutual authentication protocol for multi-server based D2D communication6
A one-time-pad-like chaotic image encryption scheme using data steganography6
PARGMF: A provenance-enabled automated rule generation and matching framework with multi-level attack description model6
Efficient public auditing scheme for non-administrator group with secure user revocation6
Hybrid KD-NFT: A multi-layered NFT assisted robust Knowledge Distillation framework for Internet of Things6
Guidelines for GDPR compliance in Big Data systems6
A cancelable biometric authentication system based on feature-adaptive random projection5
A Deep Learning Ensemble Approach to Detecting Unknown Network Attacks5
Enhancing android malware detection explainability through function call graph APIs5
Editorial Board5
Blockchain-based searchable encryption with efficient result verification and fair payment5
Blockchain-based secure and trusted data sharing scheme for autonomous vehicle underlying 5G5
Classifying attack traffic in IoT environments via few-shot learning5
A chaotic image encryption scheme based on multi-directional confusion and diffusion operations5
Puncturable-based broadcast encryption with tracking for preventing malicious encryptors in cloud file sharing5
Efficient privacy-preserving face verification scheme5
Provably secure and biometric-based secure access of e-Governance services using mobile devices5
A location privacy protection method in spatial crowdsourcing5
Detecting malicious encrypted traffic with privacy set intersection in cloud-assisted industrial internet5
Distilling blockchain requirements for digital investigation platforms5
A perspective trend of hyperelliptic curve cryptosystem for lighted weighted environments5
Security-driven prioritization for tactical mobile networks5
Insider-threat detection: Lessons from deploying the CITD tool in three multinational organisations5
Blockchain-based digital chain of custody multimedia evidence preservation framework for internet-of-things5
An efficient and practical approach for privacy-preserving Naive Bayes classification5
A scalable decentralized privacy-preserving e-voting system based on zero-knowledge off-chain computations5
Privacy preservation using game theory in e-health application5
An Ensemble approach for advance malware memory analysis using Image classification techniques5
Implementation of face recognition system using BioCryptosystem as template protection scheme5
PCPHE: A privacy comparison protocol for vulnerability detection based on homomorphic encryption5
Security of multiple RGB images in the time domain and frequency domain5
Efficient defense strategy against spam and phishing email: An evolutionary game model5
An information-theoretically secure quantum multiparty private set intersection5
NATICUSdroid: A malware detection framework for Android using native and custom permissions5
Towards AI forensics: Did the artificial intelligence system do it?5
An adaptable deep learning-based intrusion detection system to zero-day attacks5
Visually meaningful image encryption based on 2D compressive sensing and dynamic embedding5
A practical privacy-preserving communication scheme for CAMs in C-ITS5
A statistical verification method of random permutations for hiding countermeasure against side-channel attacks5
A blockchain-based keyword search scheme with dual authorization for electronic health record sharing5
Using private set intersection to achieve privacy-preserving authorization for IoT systems5
An efficient perturbation approach for multivariate data in sensitive and reliable data mining5
Detecting malicious DoH traffic: Leveraging small sample analysis and adversarial networks for detection5
Securing emergent behaviour in swarm robotics5
Preserving manipulated and synthetic Deepfake detection through face texture naturalness5
Lightweight capability-token for consent-based authentication protocol for smart sensor nodes5
Verifiable and auditable authorizations for smart industries and industrial Internet-of-Things5
Multi-level reversible data hiding for crypto-imagery via a block-wise substitution-transposition cipher5
ECQV-IBI: Identity-based identification with implicit certification5
0.085416078567505