International Journal of Information Security

Papers
(The H4-Index of International Journal of Information Security is 29. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2022-01-01 to 2026-01-01.)
ArticleCitations
BitCracker: BitLocker meets GPUs168
Verifiability for privacy-preserving computing on distributed data — a survey147
AutoPKI: public key infrastructure for IoT with automated trust transfer86
Outlier-oriented poisoning attack: a grey-box approach to disturb decision boundaries by perturbing outliers in multiclass learning67
Efficient arabic and english social spam detection using a transformer and 2D convolutional neural network-based deep learning filter64
Feature engineering impact on position falsification attacks detection in vehicular ad-hoc network60
Fast but approximate homomorphic k-means based on masking technique56
The rise of “security and privacy”: bibliometric analysis of computer privacy research54
Using machine learning to detect network intrusions in industrial control systems: a survey54
An intrusion detection approach based on incremental long short-term memory50
Systematic review of SIEM technology: SIEM-SC birth42
Automated broken object-level authorization attack detection in REST APIs through OpenAPI to colored petri nets transformation38
Adaptive trust evaluation model based on container security analysis in the Docker platform37
can-sleuth: Sleuthing out the capabilities, limitations, and performance impacts of automotive intrusion detection datasets36
Malware classification approaches utilizing binary and text encoding of permissions35
Xai-driven black-box adversarial attacks on network intrusion detectors34
Weighted quality criteria for cyber threat intelligence: assessment and prioritisation in the MISP data model34
Random resampling algorithms for addressing the imbalanced dataset classes in insider threat detection33
Fairness as a Service (FaaS): verifiable and privacy-preserving fairness auditing of machine learning systems32
Survey on image encryption techniques using chaotic maps in spatial, transform and spatiotemporal domains32
Balancing usability, user experience, security and privacy in XR systems: a multidimensional approach32
BLoCNet: a hybrid, dataset-independent intrusion detection system using deep learning31
A comprehensive approach for mitigating impersonation in online assessment: integrity policy and random authentication31
Ensemble learning-based adaptive and adversarial techniques for APT attack detection30
Acnn: arbitrary trace attacks based on leakage area detection30
A vulnerability assessment and exploitation analysis of a powerline communication HomePlug AV network adapter30
Pseudonym shuffling-driven blockchain and Autoencoder-based secure E-healthcare data management29
Enhancing phishing email detection with stylometric features and classifier stacking29
Unmasking the common traits: an ensemble approach for effective malware detection29
MEDICALHARM: A threat modeling designed for modern medical devices and a comprehensive study on effectiveness, user satisfaction, and security perspectives29
0.062497138977051