Journal of Information Security and Applications

Papers
(The TQCC of Journal of Information Security and Applications is 5. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2022-01-01 to 2026-01-01.)
ArticleCitations
Editorial Board123
Robust zero-watermarking algorithm via multi-scale feature analysis for medical images87
SBRAC: Blockchain-based sealed-bid auction with bidding price privacy and public verifiability56
Refined statistical attacks against searchable symmetric encryption using non-indexed documents52
Synergistic compensation for RGB-based blind color image watermarking to withstand JPEG compression45
The reality of backdoored S-Boxes—An eye opener43
Distinguishing and key recovery attacks on the reduced-round SNOW-V and SNOW-Vi42
Bane or Boon: Measuring the effect of evasive malware on system call classifiers41
Impossible differential cryptanalysis of FBC-12840
Plaintext recovery and tag guessing attacks on authenticated encryption algorithm COLM37
DRAC: A dynamic fine-grained access control scheme for cloud storage with censorship-coerced resistance34
Detection of Evasive Android Malware Using EigenGCN33
Understanding practitioner perspectives on using privacy harm categories for privacy risk assessment33
Improving data extraction accuracy for median filter-based data hiding method32
Incorporating deep learning into capacitive images for smartphone user authentication30
Statistical privacy protection for secure data access control in cloud29
Editorial Board29
Merkle multi-branch hash tree-based dynamic data integrity auditing for B5G network cloud storage29
PVO-based reversible data hiding using bit plane segmentation and pixel expansion26
PGAN framework for synthesizing sensor data privately25
A lightweight intrusion detection system for connected autonomous vehicles based on ECANet and image encoding25
A deep learning assisted personalized deception system for countering web application attacks24
Robust watermarking based on optimal synchronization signal24
Lightweight privacy-preserving authenticated key agreements using physically unclonable functions for internet of drones24
Smart contracts vulnerability detection model based on adversarial multi-task learning24
Collusion-resistant multi-user searchable symmetric encryption with conjunctive query and suppressed pattern leakage23
Cybersecurity Digital Twins: Concept, blueprint, and challenges for multi-ownership digital service chains23
A 3D robust chaotic speech encryption scheme based on feature hashing and key distribution23
Security concerns for Large Language Models: A survey23
Maaker: A framework for detecting and defeating evasion techniques in Android malware22
Current approaches and future directions for Cyber Threat Intelligence sharing: A survey22
NeuroIDBench: An open-source benchmark framework for the standardization of methodology in brainwave-based authentication research21
A novel 5-bit S-box design for lightweight cryptography algorithms21
A one-time-pad-like chaotic image encryption scheme using data steganography20
SDT-CNN-based network security situation awareness20
An adaptable deep learning-based intrusion detection system to zero-day attacks20
Assessing cyber threats for storyless systems20
Exposing the darkness within: A review of dark personality traits, models, and measures and their relationship to insider threats20
Vulnerabilities in Machine Learning for cybersecurity: Current trends and future research directions20
A new anonymous authentication framework for secure smart grids applications19
Puncturable-based broadcast encryption with tracking for preventing malicious encryptors in cloud file sharing19
GuardFS: A file system for integrated detection and mitigation of Linux-based ransomware19
Towards a robust and trustworthy machine learning system development: An engineering perspective19
A novel blockchain-based anonymous roaming authentication scheme for VANET18
Editorial Board18
A perspective trend of hyperelliptic curve cryptosystem for lighted weighted environments18
A scalable and semi-supervised approach for Ethereum fraud detection using Graph Neural Networks and K-Nearest Neighbors clustering18
A novel model for voice command fingerprinting using deep learning18
An information-theoretically secure quantum multiparty private set intersection18
A different base approach for better efficiency on range proofs18
A statistical verification method of random permutations for hiding countermeasure against side-channel attacks18
A provably secure collusion-resistant identity-based proxy re-encryption scheme based on NTRU18
Generalized implicit-key attacks on RSA18
Editorial Board17
High payload H.266/Versatile Video Coding (VVC) steganography based on affine motion estimation and chaotic maps17
Deep GraphSAGE enhancements for intrusion detection: Analyzing attention mechanisms and GCN integration17
PARGMF: A provenance-enabled automated rule generation and matching framework with multi-level attack description model17
VeriKNN: A verifiable and efficient secure k-NN query scheme via homomorphic encryption in dual-cloud environments17
Adversarial feature generation for ML-based intrusion detection in the petrochemical industry17
Securing emergent behaviour in swarm robotics17
Blockchain-based access control model for smart grids using peak hour and privilege level attributes (BACS-HP)17
Subject Data Auditing via Source Inference Attack in Cross-Silo Federated Learning16
FRAPE: A Framework for Risk Assessment, Prioritization and Explainability of vulnerabilities in cybersecurity16
Fed-HA: A Privacy-Preserving Robust Federated Learning Scheme based on Homomorphic Assessment16
Novel Hybrid Model for Intrusion Prediction on Cyber Physical Systems’ Communication Networks based on Bio-inspired Deep Neural Network Structure16
On the feasibility of E2E verifiable online voting – A case study from Durga Puja trial16
Moiré pattern generation-based image steganography16
A tenant-aware deep learning-based intrusion detection system for detecting DDoS attacks in multi-tenant SaaS networks15
Secure server-aided attribute-based signature with perfect anonymity for cloud-assisted systems15
A lattice-based group signature with backward unlinkability for medical blockchain systems15
Enabling anonymized open-data linkage by authorized parties14
Differential privacy performance evaluation under the condition of non-uniform noise distribution14
Nash mixed detection strategy of multi-type network attack based on zero-sum stochastic game14
Host-based intrusion detection with multi-datasource and deep learning14
A designated tester-based certificateless public key encryption with conjunctive keyword search for cloud-based MIoT in dynamic multi-user environment14
SecTwin: A secure and efficient authentication mechanism for vehicular digital twins13
SoK: Systematic analysis of adversarial threats against deep learning approaches for autonomous anomaly detection systems in SDN-IoT networks13
Personal information: Perceptions, types and evolution13
FP-growth-based signature extraction and unknown variants of DoS/DDoS attack detection on real-time data stream13
A hybrid BTP approach with filtered BCH codes for improved performance and security13
Reversible data hiding in encrypted images using adaptive block-level pixel difference encoding13
Multi-mediated semi-quantum key distribution protocol with cyclic topology13
Dynamic-anonymous privacy-preserving authenticated aggregation for safety-warning system for the Internet of Vehicles13
You are what the permissions told me! Android malware detection based on hybrid tactics13
A high-accuracy phishing website detection method based on machine learning13
Real-time Automotive Ethernet Intrusion Detection Using Sliding Window-Based Temporal Convolutional Residual Attention Networks13
LR-CAKA: A leakage-resilient compatible authenticated key agreement protocol for heterogeneous public-key cryptosystems13
A distributed privacy-preserving data aggregation scheme for smart grid with fine-grained access control13
Through the static: Demystifying malware visualization via explainability13
A hybrid-trust-based emergency message dissemination model for vehicular ad hoc networks13
Disposable identities: Solving web tracking12
Certificate-based authenticated encryption with keyword search: Enhanced security model and a concrete construction for Internet of Things12
Improved neural distinguishers with multi-round and multi-splicing construction12
AB-FGSM: AdaBelief optimizer and FGSM-based approach to generate adversarial examples12
Editorial Board12
Corrigendum to “An extended Attribute-based access control with controlled delegation in IoT” [Journal of Information Systems and Applications 76 (2023) 103473]12
AUKA: Asynchronous updatable key agreement for edge-based mobile crowd sensing12
A quantum resistant multi-user signcryption scheme featuring key invisibility for Internet of Things12
Fed-LSAE: Thwarting poisoning attacks against federated cyber threat detection system via Autoencoder-based latent space inspection12
SoK: The design paradigm of safe and secure defaults12
An anonymous verifiable random function with unbiasability and constant size proof12
4D chaotic system-based secure data hiding method to improve robustness and embedding capacity of videos12
Secure sparse watermarking on DWT-SVD for digital images12
Intervalmapping and QR code based multi-stage reversible watermarking scheme for vector map distribution and source tracing12
A consumer-centered security framework for sharing health data in social networks12
A novel scheme to encrypting autonomous driving scene point clouds based on optical chaos11
Realization of multi-image encryption algorithm based on DNA and chaotic system on FPGA11
Image-based malware representation approach with EfficientNet convolutional neural networks for effective malware classification11
Enhancing privacy-preserving machine learning with self-learnable activation functions in fully homomorphic encryption11
Hierarchical Threshold Multi-Key Fully Homomorphic Encryption11
Blockchain-based threshold proxy re-encryption scheme with zero-knowledge proofs for confidential and verifiable IoT networks11
Reversible data hiding in encrypted image using two-pass pixel value ordering11
A secure and efficient face template protection scheme based on chaos11
Real-time monitoring model of DDoS attacks using distance thresholds in Edge cooperation networks11
Lightweight certificate revocation for low-power IoT with end-to-end security11
A privacy protection scheme for biological characteristics based on 4D hyperchaos and matrix transformation11
Detection of identity swapping attacks in low-resolution image settings10
Adversarial watermark: A robust and reliable watermark against removal10
On the modeling of cyber-attacks associated with social engineering: A parental control prototype10
A dependable hybrid machine learning model for network intrusion detection10
Hiding speech in music files10
BridgeSec: Facilitating effective communication between security engineering and systems engineering10
WiCapose: Multi-modal fusion based transparent authentication in mobile environments10
An efficient cheating-detectable secret image sharing scheme with smaller share sizes10
TIM: Secure and usable authentication for smartphones10
Locally optimum image watermark detector based on statistical modeling of SWT-EFMs magnitudes10
Secure outsourced decryption for FHE-based privacy-preserving cloud computing9
Scan-free verifiable public-key searchable encryption supporting efficient user updates in distributed systems9
HTTP request pattern based signatures for early application layer DDoS detection: A firewall agnostic approach9
Efficient verifiable secure aggregation protocols for federated learning9
Classification of random number generator applications in IoT: A comprehensive taxonomy9
A comprehensive survey of automated Advanced Persistent Threat attribution: Taxonomy, methods, challenges and open research problems9
Privacy-preserving and verifiable multi-task data aggregation for IoT-based healthcare9
A novel approach for malicious URL detection using RoBERTa and sparse autoencoder9
Multi-party anonymous authentication scheme in heterogeneous network slicing9
Local Search Trajectories over S-box space9
Secure multi-factor access control mechanism for pairing blockchains9
Lattice-based puncturable blind signature scheme: Enhancing privacy and security in large language models9
Addressing insider attacks via forensic-ready risk management9
Homomorphic additive lightweight block cipher scheme for securing IoT applications9
Color image encryption algorithm based on hybrid chaos and layered strategies9
LSPR23: A novel IDS dataset from the largest live-fire cybersecurity exercise9
Automated enumeration of block cipher differentials: An optimized branch-and-bound GPU framework9
A feature vector-based modeling attack method on symmetrical obfuscated interconnection PUF9
A general framework for high-dimension data secure aggregation with resilience to dropouts9
Vertin: Fast, Communication-friendly and Key-compact secure inference system for NNs and LLMs9
Performance analysis of a parameterized minutiae-based approach for securing fingerprint templates in biometric authentication systems9
A secure and effective image encryption scheme by combining parallel compressed sensing with secret sharing scheme9
Detection of intranet scanning traffic and tool detection based on multi-feature fusion9
A group key agreement protocol based on ECDH and short signature9
Robust image hashing based on multi-view dimension reduction8
Modeling and physical attack resistant authentication protocol with double PUFs8
A lightweight hierarchical key management approach for internet of things8
Quantum-resilient blockchain framework for privacy-preserving genomic data sharing and analysis8
A generic cryptographic algorithm identification scheme based on ciphertext features8
Deepfakes in digital media forensics: Generation, AI-based detection and challenges8
A security model to protect the isolation of medical data in the cloud using hybrid cryptography8
Non-additive image steganographic framework based on variational inference in Markov Random Fields8
Visualization-based comprehensive feature representation with improved EfficientNet for malicious file and variant recognition8
Secure information processing for multimedia forensics using zero-trust security model for large scale data analytics in SaaS cloud computing environment8
From the detection towards a pyramidal classification of terrorist propaganda8
A Pairing-free Dynamic Multi-receiver Certificateless Authenticated Searchable Encryption for cloud storage8
VHNet: A Video Hiding Network with robustness to video coding8
A novel method to generate key-dependent s-boxes with identical algebraic properties8
Semi-supervised QIM steganalysis with ladder networks8
Fractional salp swarm algorithm: An association rule based privacy-preserving strategy for data sanitization8
Isogeny computation on Kummer lines and applications8
A multi-label network attack detection approach based on two-stage model fusion8
A privacy-preserving cross-media retrieval on encrypted data in cloud computing8
Statistical image watermark decoder using NSM-HMT in NSCT-FGPCET magnitude domain8
Designing energy-aware collaborative intrusion detection in IoT networks8
PSDCLS: Parallel simultaneous diffusion–confusion image cryptosystem based on Latin square8
ppLeader: Achieving the Privacy-Preserving Leaders in PoS Protocols7
Victimization in DDoS attacks: The role of popularity and industry sector7
Insights into security and privacy issues in smart healthcare systems based on medical images7
EO-PSI-CA: Efficient outsourced private set intersection cardinality7
Compression-robust detection of Motion-Compensated Frame Interpolation using Discrete Cosine Transform in logarithm domain7
Improved biometric data protection: Bounded brute-force strategy for maximum likelihood decoding7
QMDS:QKD-based multi-index data secure sharing solution on blockchain7
A novel privacy-preserving multi-level aggregate signcryption and query scheme for Smart Grid via mobile fog computing7
IDHG-ECC-integrated Diffie Hellman Galois–elliptic-curve cryptography for enhancing EHR data security7
Cryptographic primitives based on compact knapsack problem7
A detector for Android repackaged applications with layout-fingerprint7
Forensic analysis of web browsers lifecycle: A case study7
Multi-ciphertext equality test heterogeneous signcryption scheme based on location privacy7
Formal verification of a V2X scheme mixing traditional PKI and group signatures7
A privacy-preserving information sharing scheme in online social networks7
Anti-pruning multi-watermarking for ownership proof of steganographic autoencoders7
Bargaining game theoretical analysis framework for ransomware attacks7
A time-efficient and noise-resistant cryptosystem based on discrete wavelet transform and chaos theory: An application in image encryption7
A novel link fabrication attack detection method for low-latency SDN networks7
A semi-centralized key agreement protocol integrated multiple security communication techniques for LLM-based autonomous driving system7
A cross-architecture malware detection approach based on intermediate representation7
Privacy-preserving model for biometric-based authentication and Key Derivation Function7
Digital image steganalysis using entropy driven deep neural network7
Role mining under User-Distribution cardinality constraint7
A screen-shooting resilient data-hiding algorithm based on two-level singular value decomposition7
Uncertainty-aware regular-singular discriminant analysis for lossless watermarking7
Robust clustering federated learning with trusted anchor clients7
Verifiable quaternion fully homomorphic encryption scheme for mitigating false data injection attacks by privacy preservation in fog environment7
VMC2-PS: Bloc7
LWR-based Quantum-Safe Pseudo-Random Number Generator7
A tradeoff paradigm shift in cryptographically-secure pseudorandom number generation based on discrete logarithm7
Editorial Board7
Editorial Board7
SVScanner: Detecting smart contract vulnerabilities via deep semantic extraction7
Optimization of Access Control Policies6
RNN for intrusion detection in digital substations based on the IEC 618506
Efficient quantum algorithms to break group ring cryptosystems6
Improved Sine-Tangent chaotic map with application in medical images encryption6
VSTNet: Robust watermarking scheme based on voxel space transformation for diffusion tensor imaging images6
Security implications of user non-compliance behavior to software updates: A risk assessment study6
Efficient identity-based traceable cloud data broadcasting with outsider anonymity and simultaneous individual transmission6
An efficient and practical approach for privacy-preserving Naive Bayes classification6
Dual adversarial attacks: Fooling humans and classifiers6
High-throughput block cipher implementations with SIMD6
A Deep Learning Ensemble Approach to Detecting Unknown Network Attacks6
DroidTTP: Mapping android applications with TTP for Cyber Threat Intelligence6
GRAMSSAT: An efficient label inference attack against two-party split learning based on gradient matching and semi-supervised learning6
Spatio-temporal representation learning enhanced source cell-phone recognition from speech recordings6
Keeping classical distinguisher and neural distinguisher in balance6
A Model-Free Approach to Intrusion Response Systems6
Enhancing android malware detection explainability through function call graph APIs6
Multi-datasource machine learning in intrusion detection: Packet flows, system logs and host statistics6
An improved privacy attack on smartphones exploiting the accelerometer6
DAG blockchain-based lightweight authentication and authorization scheme for IoT devices6
Post-quantum identity-based traitor tracing6
RiderAuth: A cancelable touch-signature based rider authentication scheme for driverless taxis6
A new lattice-based authentication scheme for IoT6
CyberROAD: A cybersecurity risk assessment ontology for automotive domain aligned with ISO/SAE 21434:20216
Enabling privacy-preserving medication analysis in distributed EHR systems6
Editorial Board6
Quaternion with quantum walks for designing a novel color image cryptosystem6
Implementation of face recognition system using BioCryptosystem as template protection scheme6
Improved mixture differential attacks on 6-round AES-like ciphers towards time and data complexities6
Corrigendum to ‘A novel sophisticated hybrid method for intrusion detection using the artificial immune system’6
CovertSYS: A systematic covert communication approach for providing secure end-to-end conversation via social networks6
RPCP-PURI: A robust and precise computational predictor for Phishing Uniform Resource Identification6
Enabling security risk assessment and management for business process models6
Implementing and evaluating a GDPR-compliant open-source SIEM solution6
ConvNeXt_GHSA: Integrating hybrid gated attention for malware image classification5
An authentication scheme for FANET packet payload using data hiding5
Designing attribute-based verifiable data storage and retrieval scheme in cloud computing environment5
Wi-Spoof: Generating adversarial wireless signals to deceive Wi-Fi sensing systems5
Beyond known threats: A novel strategy for isolating and detecting unknown malicious traffic5
An effective iris biometric privacy protection scheme with renewability5
Reversible data hiding scheme based on improved interpolation and three-in-one intelligent strategy5
A sanitizable signcryption scheme with public verifiability via chameleon hash function5
Using language-specific input methods and pronunciation rules to improve the guesses of passwords5
AnoGLA: An efficient scheme to improve network anomaly detection5
0.056236982345581