International Journal of Information Security

Papers
(The H4-Index of International Journal of Information Security is 23. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2021-09-01 to 2025-09-01.)
ArticleCitations
BitCracker: BitLocker meets GPUs128
The rise of “security and privacy”: bibliometric analysis of computer privacy research117
Verifiability for privacy-preserving computing on distributed data — a survey79
AutoPKI: public key infrastructure for IoT with automated trust transfer54
Anomalous behavior detection-based approach for authenticating smart home system users52
Outlier-oriented poisoning attack: a grey-box approach to disturb decision boundaries by perturbing outliers in multiclass learning50
An intrusion detection approach based on incremental long short-term memory43
Feature engineering impact on position falsification attacks detection in vehicular ad-hoc network43
Using machine learning to detect network intrusions in industrial control systems: a survey36
A content-based deep intrusion detection system32
Systematic review of SIEM technology: SIEM-SC birth31
Efficient arabic and english social spam detection using a transformer and 2D convolutional neural network-based deep learning filter30
Fast but approximate homomorphic k-means based on masking technique29
Malware classification approaches utilizing binary and text encoding of permissions28
Automated broken object-level authorization attack detection in REST APIs through OpenAPI to colored petri nets transformation25
Xai-driven black-box adversarial attacks on network intrusion detectors25
can-sleuth: Sleuthing out the capabilities, limitations, and performance impacts of automotive intrusion detection datasets25
Fairness as a Service (FaaS): verifiable and privacy-preserving fairness auditing of machine learning systems25
A comprehensive approach for mitigating impersonation in online assessment: integrity policy and random authentication25
Random resampling algorithms for addressing the imbalanced dataset classes in insider threat detection25
Adaptive trust evaluation model based on container security analysis in the Docker platform24
Balancing usability, user experience, security and privacy in XR systems: a multidimensional approach24
Survey on image encryption techniques using chaotic maps in spatial, transform and spatiotemporal domains23
Weighted quality criteria for cyber threat intelligence: assessment and prioritisation in the MISP data model23
0.063050985336304