Journal of Information Security and Applications

Papers
(The TQCC of Journal of Information Security and Applications is 7. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2020-04-01 to 2024-04-01.)
ArticleCitations
A Deep Learning-based Cryptocurrency Price Prediction Scheme for Financial Institutions115
Blockchain based secured information sharing protocol in supply chain management system with key distribution mechanism83
Computational intelligence intrusion detection techniques in mobile cloud computing environments: Review, taxonomy, and open research issues66
Security and privacy of UAV data using blockchain technology63
Enhanced credit card fraud detection based on SVM-recursive feature elimination and hyper-parameters optimization63
Attack classification of an intrusion detection system using deep learning and hyperparameter optimization59
Multiple grayscale image encryption using cross-coupled chaotic maps58
Dynamic pricing in industrial internet of things: Blockchain application for energy management in smart cities50
A robust authentication and access control protocol for securing wireless healthcare sensor networks49
Cyber security for fog-based smart grid SCADA systems: Solutions and challenges48
Adversarial attacks on machine learning cybersecurity defences in Industrial Control Systems47
A secure blockchain-based e-health records storage and sharing scheme47
Agent architecture of an intelligent medical system based on federated learning and blockchain technology44
Blockchain and quantum blind signature-based hybrid scheme for healthcare 5.0 applications43
Deterministic chaos game: A new fractal based pseudo-random number generator and its cryptographic application41
A TAN based hybrid model for android malware detection40
Multi-view deep learning for zero-day Android malware detection39
Trust-aware and cooperative routing protocol for IoT security39
Weaponized AI for cyber attacks38
Voting extreme learning machine based distributed denial of service attack detection in cloud computing35
Blockchain-empowered cloud architecture based on secret sharing for smart city35
ESEAP: ECC based secure and efficient mutual authentication protocol using smart card34
Survey of false data injection in smart power grid: Attacks, countermeasures and challenges34
Evaluation metric for crypto-ransomware detection using machine learning34
A copy-move image forgery detection technique based on tetrolet transform33
Blockchain-Enabled healthcare system for detection of diabetes32
A robust copy-move forgery detection technique based on discrete cosine transform and cellular automata32
A three-factor anonymous user authentication scheme for Internet of Things environments30
A dependable hybrid machine learning model for network intrusion detection30
Dynamic 3D scrambled image based RGB image encryption scheme using hyperchaotic system and DNA encoding30
Cryptanalysis of an image block encryption algorithm based on chaotic maps29
DeepProfile: Finding fake profile in online social network using dynamic CNN29
Practical traceable multi-authority CP-ABE with outsourcing decryption and access policy updation29
An enhanced scalable and secure RFID authentication protocol for WBAN within an IoT environment29
Inter-dataset generalization strength of supervised machine learning methods for intrusion detection28
EASBF: An efficient authentication scheme over blockchain for fog computing-enabled internet of vehicles28
Bi-GISIS KE: Modified key exchange protocol with reusable keys for IoT security28
A DDoS attack detection and defense scheme using time-series analysis for SDN28
Evaluating the cyber security readiness of organizations and its influence on performance27
An efficient general data hiding scheme based on image interpolation27
High throughput and low area architectures of secure IoT algorithm for medical image encryption27
A novel wide & deep transfer learning stacked GRU framework for network intrusion detection27
Privacy-preserving in smart contracts using blockchain and artificial intelligence for cyber risk measurements26
Certificateless authenticated encryption with keyword search: Enhanced security model and a concrete construction for industrial IoT26
Efficient and privacy-preserving authentication scheme for wireless body area networks26
A lightweight and provable secure identity-based generalized proxy signcryption (IBGPS) scheme for Industrial Internet of Things (IIoT)25
Multi-Authority CP-ABE-Based user access control scheme with constant-size key and ciphertext for IoT deployment24
Malware classification and composition analysis: A survey of recent developments24
A ciphertext-policy Attribute based encryption scheme for wireless body area networks based on ECC24
Clustering method and symmetric/asymmetric cryptography scheme adapted to securing urban VANET networks23
Attention based multi-agent intrusion detection systems using reinforcement learning23
Globalized firefly algorithm and chaos for designing substitution box23
A provably secure dynamic ID-based authenticated key agreement framework for mobile edge computing without a trusted party23
Improved Sine-Tangent chaotic map with application in medical images encryption22
On the construction of a post-quantum blockchain for smart city22
Chaos and compressive sensing based novel image encryption scheme21
Accurate and robust neural networks for face morphing attack detection21
A secure end-to-end verifiable e-voting system using blockchain and cloud server21
FUPE: A security driven task scheduling approach for SDN-based IoT–Fog networks21
On machine learning effectiveness for malware detection in Android OS using static analysis data20
Robust and accurate detection of image copy-move forgery using PCET-SVD and histogram of block similarity measures20
Energy-efficient dynamic homomorphic security scheme for fog computing in IoT networks20
Recommendation attack detection based on deep learning19
A new parallel processing architecture for accelerating image encryption based on chaos19
Android mobile malware detection using fuzzy AHP19
Social network behavior and public opinion manipulation19
An enhanced mutual authentication and key establishment protocol for TMIS using chaotic map19
A memristive RLC oscillator dynamics applied to image encryption19
Medical blockchain: Data sharing and privacy preserving of EHR based on smart contract19
A cancelable biometric authentication system based on feature-adaptive random projection19
A survey of subscription privacy on the 5G radio interface - The past, present and future19
Multi-directional block based PVD and modulus function image steganography to avoid FOBP and IEP18
BTCAS: A Blockchain-Based Thoroughly Cross-Domain Authentication Scheme18
2D Logistic-Adjusted-Chebyshev map for visual color image encryption18
Machine Learning and Software Defined Network to secure communications in a swarm of drones18
A verifiable secret sharing scheme with combiner verification and cheater identification18
Image encryption algorithm based on the finite fields in chaotic maps18
Exact greedy algorithm based split finding approach for intrusion detection in fog-enabled IoT environment18
DTMIC: Deep transfer learning for malware image classification18
An image encryption scheme based on double chaotic cyclic shift and Josephus problem18
Understanding cybersecurity behavioral habits: Insights from situational support17
Measuring cyber-physical security in industrial control systems via minimum-effort attack strategies17
Provably secure two-party authenticated key agreement protocol for post-quantum environments17
Privacy-preserving batch verification signature scheme based on blockchain for Vehicular Ad-Hoc Networks17
A certificateless ring signature scheme with batch verification for applications in VANET17
A new Pseudo random number generator based on generalized Newton complex map with dynamic key17
How is your Wi-Fi connection today? DoS attacks on WPA3-SAE17
Simulating SQL injection vulnerability exploitation using Q-learning reinforcement learning agents17
Attack scenario reconstruction approach using attack graph and alert data mining16
Securing electronic healthcare records: A mobile-based biometric authentication approach16
DAG blockchain-based lightweight authentication and authorization scheme for IoT devices16
A novel image encryption scheme based on non-adjacent parallelable permutation and dynamic DNA-level two-way diffusion16
Image splicing detection based on convolutional neural network with weight combination strategy15
Anomaly detection in substation networks15
A privacy protection scheme for telemedicine diagnosis based on double blockchain15
Malware classification for the cloud via semi-supervised transfer learning15
Deep multi-task learning for malware image classification15
Block image encryption based on modified playfair and chaotic system15
Secure and reliable data forwarding using homomorphic encryption against blackhole attacks in mobile ad hoc networks14
IFDTC4.5: Intuitionistic fuzzy logic based decision tree for E-transactional fraud detection14
An exotic multi-dimensional conceptualization for medical image encryption exerting Rossler system and Sine map14
Multicast DIS attack mitigation in RPL-based IoT-LLNs14
T-CAD: A threshold based collaborative DDoS attack detection in multiple autonomous systems14
An optimized robust watermarking technique using CKGSA in frequency domain14
Guidelines for GDPR compliance in Big Data systems14
Cryptanalysis and improvement of a two-factor user authentication scheme for smart home13
A zero watermarking approach for content authentication and tampering detection of Arabic text based on fourth level order and word mechanism of Markov model13
A Lightweight Signcryption Method for Perception Layer in Internet-of-Things13
KVMInspector: KVM Based introspection approach to detect malware in cloud environment13
A novel Byzantine fault tolerance consensus for Green IoT with intelligence based on reinforcement13
Analysing performance issues of open-source intrusion detection systems in high-speed networks13
Algebra-chaos amalgam and DNA transform based multiple digital image encryption13
Deep belief network-based hybrid model for multimodal biometric system for futuristic security applications13
Data cryptography in the Internet of Things using the artificial bee colony algorithm in a smart irrigation system13
NATICUSdroid: A malware detection framework for Android using native and custom permissions13
ETIP: An Enriched Threat Intelligence Platform for improving OSINT correlation, analysis, visualization and sharing capabilities12
Efficient and secure substitution box and random number generators over Mordell elliptic curves12
Signaling game-based availability assessment for edge computing-assisted IoT systems with malware dissemination12
A novel sophisticated hybrid method for intrusion detection using the artificial immune system12
Pseudonym change-based privacy-preserving schemes in vehicular ad-hoc networks: A survey12
Design and application of a personal credit information sharing platform based on consortium blockchain12
A provably secure ECC-based roaming authentication scheme for global mobility networks12
Lic-Sec: An enhanced AppArmor Docker security profile generator12
An Efficient Dual-image Reversible Data Hiding Scheme Based on Exploiting Modification Direction12
Elliptic Curve Cryptography based authentication scheme for Internet of Medical Things12
Blockchain-based searchable encryption with efficient result verification and fair payment12
A novel image security technique based on nucleic acid concepts12
Outsourced privacy-preserving decision tree classification service over encrypted data12
Spread-Transform Dither Modulation Watermarking of Deep Neural Network12
On the educated selection of unsupervised algorithms via attacks and anomaly classes12
NaturalAE: Natural and robust physical adversarial examples for object detectors11
A consortium blockchain based energy trading scheme for Electric Vehicles in smart cities11
An ensemble classification-based approach to detect attack level of SQL injections11
Using fake text vectors to improve the sensitivity of minority class for macro malware detection11
Privacy preservation in Distributed Deep Learning: A survey on Distributed Deep Learning, privacy preservation techniques used and interesting research directions11
A novel proxy-oriented public auditing scheme for cloud-based medical cyber physical systems11
Adaptable feature-selecting and threshold-moving complete autoencoder for DDoS flood attack mitigation11
An improved convolution Merkle tree-based blockchain electronic medical record secure storage scheme11
A PE header-based method for malware detection using clustering and deep embedding techniques11
4D mixed chaotic system and its application to RGB image encryption using substitution-diffusion11
TPPSUPPLY : A traceable and privacy-preserving blockchain system architecture for the supply chain11
Real-time and private spatio-temporal data aggregation with local differential privacy11
IESCA: An efficient image encryption scheme using 2-D cellular automata11
You are what the permissions told me! Android malware detection based on hybrid tactics11
Multi-user certificateless public key encryption with conjunctive keyword search for cloud-based telemedicine11
Security of multiple RGB images by RSA cryptosystem combined with FrDCT 11
Secrecy-ensured NOMA-based cooperative D2D-aided fog computing under imperfect CSI10
A distributed privacy-preserving data aggregation scheme for smart grid with fine-grained access control10
Shape-driven lightweight CNN for finger-vein biometrics10
Detection of distributed denial of service attacks based on information theoretic approach in time series models10
Stakeholder perspectives and requirements on cybersecurity in Europe10
Blockchain-based decentralized architecture for cloud storage system10
Assessing cyber threats for storyless systems10
Bayesian attack graphs for platform virtualized infrastructures in clouds10
Cyberprotection in IoT environments: A dynamic rule-based solution to defend smart devices10
Flow based monitoring of ICS communication in the smart grid10
Image-based malware representation approach with EfficientNet convolutional neural networks for effective malware classification10
A data hiding scheme based on the difference of image interpolation algorithms10
A novel hybrid permutation substitution base colored image encryption scheme for multimedia data10
Privacy preserving cloud based secure digital locker using Paillier based difference function and chaos based cryptosystem10
CL-ASS: An efficient and low-cost certificateless aggregate signature scheme for wireless sensor networks9
NodeXP: NOde.js server-side JavaScript injection vulnerability DEtection and eXPloitation9
A secure medical image transmission scheme aided by quantum representation9
Novel Hybrid Model for Intrusion Prediction on Cyber Physical Systems’ Communication Networks based on Bio-inspired Deep Neural Network Structure9
NyaYa: Blockchain-based electronic law record management scheme for judicial investigations9
Fuzzy extraction and PUF based three party authentication protocol using USB as mass storage device9
Robust detection of median filtering based on data-pair histogram feature and local configuration pattern9
My data, my control: A secure data sharing and access scheme over blockchain9
Bounded opacity for timed systems9
Simple and scalable blockchain with privacy9
Provably secure identity-based two-party authenticated key agreement protocol based on CBi-ISIS and Bi-ISIS problems on lattices9
Android botnet detection using machine learning models based on a comprehensive static analysis approach9
S-FoS: A secure workflow scheduling approach for performance optimization in SDN-based IoT-Fog networks9
A comparison of two hybrid ensemble techniques for network anomaly detection in spark distributed environment9
A novel image encryption algorithm using chaotic compressive sensing and nonlinear exponential function9
Image encryption algorithm based on improved Zigzag transformation and quaternary DNA coding9
High throughput novel architectures of TEA family for high speed IoT and RFID applications9
XGBXSS: An Extreme Gradient Boosting Detection Framework for Cross-Site Scripting Attacks Based on Hybrid Feature Selection Approach and Parameters Optimization9
Mitigating cyberattack related domino effects in process plants via ICS segmentation9
Survey of security supervision on blockchain from the perspective of technology9
A large-scale study on the adoption of anti-debugging and anti-tampering protections in android apps9
Dynamic secure multi-keyword ranked search over encrypted cloud data9
Practical revocable and multi-authority CP-ABE scheme from RLWE for Cloud Computing9
Enabling identity-based authorized encrypted diagnostic data sharing for cloud-assisted E-health information systems9
Spatiotemporal chaos in multiple dynamically coupled map lattices and its application in a novel image encryption algorithm9
Attacks on cryptosystems implemented via VLSI: A review9
Anomaly detection in a forensic timeline with deep autoencoders8
Efficient data confidentiality scheme for 5G wireless NOMA communications8
Collusion resistant secret sharing scheme for secure data storage and processing over cloud8
Blockchain-based secure and trusted data sharing scheme for autonomous vehicle underlying 5G8
A survey of authenticated key agreement protocols for multi-server architecture8
A new hierarchical architecture and protocol for key distribution in the context of IoT-based smart cities8
Universal stego post-processing for enhancing image steganography8
Towards an ultra lightweight block ciphers for Internet of Things8
PUF enable lightweight key-exchange and mutual authentication protocol for multi-server based D2D communication8
An efficient and practical approach for privacy-preserving Naive Bayes classification8
Verifiable online/offline multi-keyword search for cloud-assisted Industrial Internet of Things8
A new S-box construction method meeting strict avalanche criterion8
Randomized deduplication with ownership management and data sharing in cloud storage8
CS-MIA: Membership inference attack based on prediction confidence series in federated learning8
Robust Lightweight Privacy-Preserving and Session Scheme Interrogation for Fog Computing Systems8
A low-rate DDoS detection and mitigation for SDN using Renyi Entropy with Packet Drop8
Detection and mitigation of fraudulent resource consumption attacks in cloud using deep learning approach8
Enhanced (n, n)-threshold QR code secret sharing scheme based on error correction mechanism7
Trust and priority-based drone assisted routing and mobility and service-oriented solution for the internet of vehicles networks7
Adaptive reversible data hiding algorithm for interpolated images using sorting and coding7
Effective charging identity authentication scheme based on fog computing in V2G networks7
Double layered Fridrich structure to conserve medical data privacy using quantum cryptosystem7
Differential cryptanalysis of WARP7
A unified framework for cloud security transparency and audit7
Lightweight fog computing-based authentication protocols using physically unclonable functions for internet of medical things7
Towards a robust and trustworthy machine learning system development: An engineering perspective7
A chaotic video steganography technique for carrying different types of secret messages7
A secure and lightweight anonymous mutual authentication scheme for wearable devices in Medical Internet of Things7
AI@nti-Malware: An intelligent framework for defending against malware attacks7
Provably secure biometric-based client–server secure communication over unreliable networks7
Denial of wallet—Defining a looming threat to serverless computing7
NEDetector: Automatically extracting cybersecurity neologisms from hacker forums7
Post-quantum digital signature scheme based on multivariate cubic problem7
A lightweight identity-based provable data possession supporting users’ identity privacy and traceability7
Detecting malicious logins as graph anomalies7
Secure mobile internet voting system using biometric authentication and wavelet based AES7
Multi-party transaction framework for drone services based on alliance blockchain in smart cities7
Secure information processing for multimedia forensics using zero-trust security model for large scale data analytics in SaaS cloud computing environment7
An examination of susceptibility to spear phishing cyber attacks in non-English speaking communities7
Software-Defined Network enabled Vehicle to Vehicle secured data transmission protocol in VANETs7
ECB2: A novel encryption scheme using face biometrics for signing blockchain transactions7
Key pre-distribution scheme based on transversal design in large mobile fog networks with multi-clouds7
Insider-threat detection: Lessons from deploying the CITD tool in three multinational organisations7
A new lattice-based authentication scheme for IoT7
0.076588153839111