International Journal of Information Security

Papers
(The H4-Index of International Journal of Information Security is 18. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2021-04-01 to 2025-04-01.)
ArticleCitations
pbins: private bins for top-k semantic search over encrypted data using transformers103
A unit-based symbolic execution method for detecting memory corruption vulnerabilities in executable codes74
Analysis of OSPU security effect and data assembly verification under semi-network OS architecture66
Non-Alpha-Num: a novel architecture for generating adversarial examples for bypassing NLP-based clickbait detection mechanisms43
Information security and privacy challenges of cloud computing for government adoption: a systematic review42
Protection of centralized SDN control plane from high-rate Packet-In messages35
Enhancing privacy protections in national identification systems: an examination of stakeholders’ knowledge, attitudes, and practices of privacy by design34
Activity-based payments: alternative (anonymous) online payment model27
Neighbor discovery protocol anomaly-based detection system using neural network algorithm26
AutoPKI: public key infrastructure for IoT with automated trust transfer23
Generating ICS vulnerability playbooks with open standards22
A voting gray wolf optimizer-based ensemble learning models for intrusion detection in the Internet of Things22
Adaptive context-aware access control for IoT environments leveraging fog computing22
A comprehensive Blockchain-oriented secure framework for SDN/Fog-based IoUT22
Exploring smooth number-based MAC algorithms for secure communication in IoT devices: a systematic literature review21
Efficient arabic and english social spam detection using a transformer and 2D convolutional neural network-based deep learning filter20
Inflect-text: a novel mechanism to evade neural text classifiers by leveraging word inflectional perturbations19
A location-updating based self-healing group key management scheme for VANETs18
Using machine learning to detect network intrusions in industrial control systems: a survey18
0.3287250995636