Journal of Information Security and Applications

Papers
(The TQCC of Journal of Information Security and Applications is 6. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2021-05-01 to 2025-05-01.)
ArticleCitations
A novel 5-bit S-box design for lightweight cryptography algorithms92
Dynamic secure multi-keyword ranked search over encrypted cloud data91
Editorial Board78
SBRAC: Blockchain-based sealed-bid auction with bidding price privacy and public verifiability54
Maaker: A framework for detecting and defeating evasion techniques in Android malware52
The reality of backdoored S-Boxes—An eye opener51
Plaintext recovery and tag guessing attacks on authenticated encryption algorithm COLM46
Impossible differential cryptanalysis of FBC-12844
Introduction to the special issue on privacy and security for location-based services and devices44
Implementation and evaluation of a privacy-preserving distributed ABC scheme based on multi-signatures43
Distinguishing and key recovery attacks on the reduced-round SNOW-V and SNOW-Vi43
Statistical privacy protection for secure data access control in cloud40
A deep learning assisted personalized deception system for countering web application attacks40
Detection of Evasive Android Malware Using EigenGCN39
PVO-based reversible data hiding using bit plane segmentation and pixel expansion38
Refined statistical attacks against searchable symmetric encryption using non-indexed documents37
Bane or Boon: Measuring the effect of evasive malware on system call classifiers37
Incorporating deep learning into capacitive images for smartphone user authentication35
Lightweight privacy-preserving authenticated key agreements using physically unclonable functions for internet of drones35
Synergistic compensation for RGB-based blind color image watermarking to withstand JPEG compression35
Merkle multi-branch hash tree-based dynamic data integrity auditing for B5G network cloud storage34
Robust zero-watermarking algorithm via multi-scale feature analysis for medical images33
PGAN framework for synthesizing sensor data privately32
Smart contracts vulnerability detection model based on adversarial multi-task learning28
Current approaches and future directions for Cyber Threat Intelligence sharing: A survey28
Image data security using Quasigroup combined with Fibonacci Q-transformation28
PUF enable lightweight key-exchange and mutual authentication protocol for multi-server based D2D communication27
Editorial Board27
A novel key and image concealing with static-dynamic pattern using modified periodic table27
Lightweight capability-token for consent-based authentication protocol for smart sensor nodes26
Generalized implicit-key attacks on RSA26
Securing emergent behaviour in swarm robotics26
Towards a robust and trustworthy machine learning system development: An engineering perspective25
Editorial Board25
A perspective trend of hyperelliptic curve cryptosystem for lighted weighted environments24
A novel model for voice command fingerprinting using deep learning24
Guidelines for GDPR compliance in Big Data systems24
Deep GraphSAGE enhancements for intrusion detection: Analyzing attention mechanisms and GCN integration24
PARGMF: A provenance-enabled automated rule generation and matching framework with multi-level attack description model24
Novel Hybrid Model for Intrusion Prediction on Cyber Physical Systems’ Communication Networks based on Bio-inspired Deep Neural Network Structure23
An enhanced scalable and secure RFID authentication protocol for WBAN within an IoT environment23
Exposing the darkness within: A review of dark personality traits, models, and measures and their relationship to insider threats23
Searchable encryption using secret sharing scheme that realizes direct search of encrypted documents and disjunctive search of multiple keywords22
A novel blockchain-based anonymous roaming authentication scheme for VANET22
FRAPE: A Framework for Risk Assessment, Prioritization and Explainability of vulnerabilities in cybersecurity22
Permission-based Android malware analysis by using dimension reduction with PCA and LDA22
A different base approach for better efficiency on range proofs22
Puncturable-based broadcast encryption with tracking for preventing malicious encryptors in cloud file sharing21
A one-time-pad-like chaotic image encryption scheme using data steganography21
An information-theoretically secure quantum multiparty private set intersection21
A (k, n) secret document sharing with meaningful shares21
A provably secure collusion-resistant identity-based proxy re-encryption scheme based on NTRU21
Bit-wise cryptanalysis on AND-RX permutation Friet-PC20
NeuroIDBench: An open-source benchmark framework for the standardization of methodology in brainwave-based authentication research20
A statistical verification method of random permutations for hiding countermeasure against side-channel attacks20
A new anonymous authentication framework for secure smart grids applications19
Moiré pattern generation-based image steganography19
Multicast DIS attack mitigation in RPL-based IoT-LLNs19
A hybrid BTP approach with filtered BCH codes for improved performance and security19
An adaptable deep learning-based intrusion detection system to zero-day attacks19
Assessing cyber threats for storyless systems19
Fast3DS: A real-time full-convolutional malicious domain name detection system19
An improved convolution Merkle tree-based blockchain electronic medical record secure storage scheme18
On the feasibility of E2E verifiable online voting – A case study from Durga Puja trial18
Personal information: Perceptions, types and evolution18
Exact greedy algorithm based split finding approach for intrusion detection in fog-enabled IoT environment18
You are what the permissions told me! Android malware detection based on hybrid tactics18
Host-based intrusion detection with multi-datasource and deep learning18
Subject Data Auditing via Source Inference Attack in Cross-Silo Federated Learning17
A distributed privacy-preserving data aggregation scheme for smart grid with fine-grained access control17
Differential privacy performance evaluation under the condition of non-uniform noise distribution17
A hybrid-trust-based emergency message dissemination model for vehicular ad hoc networks17
A designated tester-based certificateless public key encryption with conjunctive keyword search for cloud-based MIoT in dynamic multi-user environment17
Enabling anonymized open-data linkage by authorized parties17
Dynamic-anonymous privacy-preserving authenticated aggregation for safety-warning system for the Internet of Vehicles17
FP-growth-based signature extraction and unknown variants of DoS/DDoS attack detection on real-time data stream16
Dynamic 3D scrambled image based RGB image encryption scheme using hyperchaotic system and DNA encoding16
Nash mixed detection strategy of multi-type network attack based on zero-sum stochastic game16
A high-accuracy phishing website detection method based on machine learning16
Secure server-aided attribute-based signature with perfect anonymity for cloud-assisted systems16
An anonymous verifiable random function with unbiasability and constant size proof15
Lossless fuzzy extractor enabled secure authentication using low entropy noisy sources15
Improved neural distinguishers with multi-round and multi-splicing construction15
A consumer-centered security framework for sharing health data in social networks15
An efficient cheating-detectable secret image sharing scheme with smaller share sizes15
StealthPDF: Data hiding method for PDF file with no visual degradation15
Corrigendum to “An extended Attribute-based access control with controlled delegation in IoT” [Journal of Information Systems and Applications 76 (2023) 103473]15
Adversarial watermark: A robust and reliable watermark against removal15
Fed-LSAE: Thwarting poisoning attacks against federated cyber threat detection system via Autoencoder-based latent space inspection15
4D chaotic system-based secure data hiding method to improve robustness and embedding capacity of videos15
Certificate-based authenticated encryption with keyword search: Enhanced security model and a concrete construction for Internet of Things14
Anonymous and lightweight secure authentication protocol for mobile Agent system14
Editorial Board14
A quantum resistant multi-user signcryption scheme featuring key invisibility for Internet of Things14
Editorial Board14
Reversible data hiding in encrypted image using two-pass pixel value ordering13
Disposable identities: Solving web tracking13
Real-time monitoring model of DDoS attacks using distance thresholds in Edge cooperation networks13
Hierarchical Threshold Multi-Key Fully Homomorphic Encryption13
Function-level obfuscation detection method based on Graph Convolutional Networks13
Detection of identity swapping attacks in low-resolution image settings13
Lightweight certificate revocation for low-power IoT with end-to-end security13
BridgeSec: Facilitating effective communication between security engineering and systems engineering13
A novel sophisticated hybrid method for intrusion detection using the artificial immune system13
Enhancing privacy-preserving machine learning with self-learnable activation functions in fully homomorphic encryption13
Hiding speech in music files13
AB-FGSM: AdaBelief optimizer and FGSM-based approach to generate adversarial examples13
Identity-based outsider anonymous cloud data outsourcing with simultaneous individual transmission for IoT environment13
Locally optimum image watermark detector based on statistical modeling of SWT-EFMs magnitudes12
A dependable hybrid machine learning model for network intrusion detection12
Image-based malware representation approach with EfficientNet convolutional neural networks for effective malware classification12
Automated enumeration of block cipher differentials: An optimized branch-and-bound GPU framework12
Attacks on cryptosystems implemented via VLSI: A review12
Local Search Trajectories over S-box space12
Lic-Sec: An enhanced AppArmor Docker security profile generator12
SoK: The design paradigm of safe and secure defaults12
Secure outsourced decryption for FHE-based privacy-preserving cloud computing12
Neural networks based domain name generation12
Classification of random number generator applications in IoT: A comprehensive taxonomy12
Scan-free verifiable public-key searchable encryption supporting efficient user updates in distributed systems12
Performance analysis of a parameterized minutiae-based approach for securing fingerprint templates in biometric authentication systems12
Provably secure biometric-based client–server secure communication over unreliable networks12
Secure sparse watermarking on DWT-SVD for digital images12
LSPR23: A novel IDS dataset from the largest live-fire cybersecurity exercise12
I-CIFA: An improved collusive interest flooding attack in named data networking12
A secure and effective image encryption scheme by combining parallel compressed sensing with secret sharing scheme12
On the transparency order relationships between one Boolean function and its decomposition functions12
TIM: Secure and usable authentication for smartphones12
A blockchain based secure communication framework for community interaction12
On the modeling of cyber-attacks associated with social engineering: A parental control prototype11
Color image encryption algorithm based on hybrid chaos and layered strategies11
HTTP request pattern based signatures for early application layer DDoS detection: A firewall agnostic approach11
Blockchain-based decentralized architecture for cloud storage system11
Multi-party anonymous authentication scheme in heterogeneous network slicing11
Detection of intranet scanning traffic and tool detection based on multi-feature fusion11
WiCapose: Multi-modal fusion based transparent authentication in mobile environments11
Addressing insider attacks via forensic-ready risk management11
Secure multi-factor access control mechanism for pairing blockchains11
Privacy-preserving and verifiable multi-task data aggregation for IoT-based healthcare11
Homomorphic additive lightweight block cipher scheme for securing IoT applications11
A group key agreement protocol based on ECDH and short signature11
A Pairing-free Dynamic Multi-receiver Certificateless Authenticated Searchable Encryption for cloud storage10
From the detection towards a pyramidal classification of terrorist propaganda10
A novel method to generate key-dependent s-boxes with identical algebraic properties10
Isogeny computation on Kummer lines and applications10
Designing energy-aware collaborative intrusion detection in IoT networks10
Deepfakes in digital media forensics: Generation, AI-based detection and challenges10
A generic cryptographic algorithm identification scheme based on ciphertext features10
Semi-supervised QIM steganalysis with ladder networks10
Fractional salp swarm algorithm: An association rule based privacy-preserving strategy for data sanitization10
A privacy-preserving cross-media retrieval on encrypted data in cloud computing10
An intrusion tolerant identity provider with user attributes confidentiality10
Statistical image watermark decoder using NSM-HMT in NSCT-FGPCET magnitude domain10
Visualization-based comprehensive feature representation with improved EfficientNet for malicious file and variant recognition10
A lightweight hierarchical key management approach for internet of things10
A comprehensive review on collision-resistant hash functions on lattices10
A secure and efficient group signature scheme based on multivariate public key cryptography9
A novel privacy-preserving multi-level aggregate signcryption and query scheme for Smart Grid via mobile fog computing9
PSDCLS: Parallel simultaneous diffusion–confusion image cryptosystem based on Latin square9
Secure information processing for multimedia forensics using zero-trust security model for large scale data analytics in SaaS cloud computing environment9
A multi-label network attack detection approach based on two-stage model fusion9
A secure end-to-end verifiable e-voting system using blockchain and cloud server9
Modeling and physical attack resistant authentication protocol with double PUFs9
Non-additive image steganographic framework based on variational inference in Markov Random Fields9
VHNet: A Video Hiding Network with robustness to video coding9
A security model to protect the isolation of medical data in the cloud using hybrid cryptography9
Verifiable quaternion fully homomorphic encryption scheme for mitigating false data injection attacks by privacy preservation in fog environment9
Cyberprotection in IoT environments: A dynamic rule-based solution to defend smart devices9
Robust image hashing based on multi-view dimension reduction9
Chaos and compressive sensing based novel image encryption scheme9
Insights into security and privacy issues in smart healthcare systems based on medical images8
A detector for Android repackaged applications with layout-fingerprint8
Editorial Board8
Editorial Board8
A mutual authentication scheme for establishing secure device-to-device communication sessions in the edge-enabled smart cities8
An improved privacy attack on smartphones exploiting the accelerometer8
An efficient and practical approach for privacy-preserving Naive Bayes classification8
IDHG-ECC-integrated Diffie Hellman Galois–elliptic-curve cryptography for enhancing EHR data security8
Practical dynamic group signature with efficient concurrent joins and batch verifications8
Privacy-preserving model for biometric-based authentication and Key Derivation Function8
Role mining under User-Distribution cardinality constraint8
LWR-based Quantum-Safe Pseudo-Random Number Generator8
A screen-shooting resilient data-hiding algorithm based on two-level singular value decomposition8
A novel link fabrication attack detection method for low-latency SDN networks8
A time-efficient and noise-resistant cryptosystem based on discrete wavelet transform and chaos theory: An application in image encryption8
Robust Lightweight Privacy-Preserving and Session Scheme Interrogation for Fog Computing Systems8
Implementation of face recognition system using BioCryptosystem as template protection scheme8
A tradeoff paradigm shift in cryptographically-secure pseudorandom number generation based on discrete logarithm8
SVScanner: Detecting smart contract vulnerabilities via deep semantic extraction8
A multiclass hybrid approach to estimating software vulnerability vectors and severity score8
Cryptographic primitives based on compact knapsack problem8
Adversarial attacks by attaching noise markers on the face against deep face recognition8
Anti-pruning multi-watermarking for ownership proof of steganographic autoencoders8
Formal verification of a V2X scheme mixing traditional PKI and group signatures8
Dual adversarial attacks: Fooling humans and classifiers8
VSTNet: Robust watermarking scheme based on voxel space transformation for diffusion tensor imaging images8
A semi-centralized key agreement protocol integrated multiple security communication techniques for LLM-based autonomous driving system8
Improved mixture differential attacks on 6-round AES-like ciphers towards time and data complexities8
EO-PSI-CA: Efficient outsourced private set intersection cardinality8
RPCP-PURI: A robust and precise computational predictor for Phishing Uniform Resource Identification7
CovertSYS: A systematic covert communication approach for providing secure end-to-end conversation via social networks7
Post-quantum identity-based traitor tracing7
A Deep Learning Ensemble Approach to Detecting Unknown Network Attacks7
High-throughput block cipher implementations with SIMD7
Forensic analysis of web browsers lifecycle: A case study7
Simple and efficient threshold changeable secret sharing7
A cancelable biometric authentication system based on feature-adaptive random projection7
Enhancing android malware detection explainability through function call graph APIs7
Efficient identity-based traceable cloud data broadcasting with outsider anonymity and simultaneous individual transmission7
ETIP: An Enriched Threat Intelligence Platform for improving OSINT correlation, analysis, visualization and sharing capabilities7
Multi-datasource machine learning in intrusion detection: Packet flows, system logs and host statistics7
RiderAuth: A cancelable touch-signature based rider authentication scheme for driverless taxis7
Corrigendum to ‘A novel sophisticated hybrid method for intrusion detection using the artificial immune system’7
A lightweight certificateless authentication scheme and group key agreement with dynamic updating mechanism for LTE-V-based internet of vehicles in smart cities7
GwPFV: A novel packet forwarding verification mechanism based on gateways in SDN-based storage environment7
Generalization of multicast encryption for Internet of Things deployment7
Digital image steganalysis using entropy driven deep neural network7
Quaternion with quantum walks for designing a novel color image cryptosystem7
Blockchain-based searchable encryption with efficient result verification and fair payment7
DAG blockchain-based lightweight authentication and authorization scheme for IoT devices7
Multi-ciphertext equality test heterogeneous signcryption scheme based on location privacy7
Compression-robust detection of Motion-Compensated Frame Interpolation using Discrete Cosine Transform in logarithm domain7
Security analysis of the Classic McEliece, HQC and BIKE schemes in low memory7
Keeping classical distinguisher and neural distinguisher in balance7
Improved Sine-Tangent chaotic map with application in medical images encryption7
A new lattice-based authentication scheme for IoT7
SteriCNN: Cloud native stego content sterilization framework6
HAKECC: Highly efficient authentication and key agreement scheme based on ECDH for RFID in IOT environment6
A Model-Free Approach to Intrusion Response Systems6
Towards evaluating robustness of violence detection in videos using cross-domain transferability6
Analysis and enhancement of secure three-factor user authentication using Chebyshev Chaotic Map6
Improved (related-key) differential cryptanalysis on 6
NEDetector: Automatically extracting cybersecurity neologisms from hacker forums6
A portable hardware security module and cryptographic key generator6
Corrigendum to Fast hybrid-MixNet for security and privacy using NTRU algorithm: [Journal of Information Security and Applications, Volume 60, August 2021, Start page–End page/102872]6
ZeroMT: Towards Multi-Transfer transactions with privacy for account-based blockchain6
Crypto-space image steganography based on blind flipping6
An explainable deepfake of speech detection method with spectrograms and waveforms6
A sanitizable signcryption scheme with public verifiability via chameleon hash function6
Secure word-level sorting based on fully homomorphic encryption6
An effective iris biometric privacy protection scheme with renewability6
A cancellable iris template protection scheme based on inverse merger and Bloom filter6
A generic framework for decomposing block cipher structure with secret components6
Enhancing robustness in video data hiding against recompression with a wide parameter range6
PB-3PAKA: Password-based three-party authenticated key agreement protocol for mobile devices in post-quantum environments6
VMSE: Verifiable multi-keyword searchable encryption in multi-user setting supporting keywords updating6
Editorial Board6
Guaranteeing anonymity in attribute-based authorization6
NodeXP: NOde.js server-side JavaScript injection vulnerability DEtection and eXPloitation6
Using language-specific input methods and pronunciation rules to improve the guesses of passwords6
0.28724408149719