International Journal of Information Security

Papers
(The H4-Index of International Journal of Information Security is 25. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2021-11-01 to 2025-11-01.)
ArticleCitations
The rise of “security and privacy”: bibliometric analysis of computer privacy research142
An intrusion detection approach based on incremental long short-term memory136
Using machine learning to detect network intrusions in industrial control systems: a survey83
Feature engineering impact on position falsification attacks detection in vehicular ad-hoc network59
Fast but approximate homomorphic k-means based on masking technique57
Verifiability for privacy-preserving computing on distributed data — a survey57
AutoPKI: public key infrastructure for IoT with automated trust transfer54
Outlier-oriented poisoning attack: a grey-box approach to disturb decision boundaries by perturbing outliers in multiclass learning45
Efficient arabic and english social spam detection using a transformer and 2D convolutional neural network-based deep learning filter37
Systematic review of SIEM technology: SIEM-SC birth36
BitCracker: BitLocker meets GPUs36
Anomalous behavior detection-based approach for authenticating smart home system users35
A comprehensive approach for mitigating impersonation in online assessment: integrity policy and random authentication34
Automated broken object-level authorization attack detection in REST APIs through OpenAPI to colored petri nets transformation32
Fairness as a Service (FaaS): verifiable and privacy-preserving fairness auditing of machine learning systems31
Random resampling algorithms for addressing the imbalanced dataset classes in insider threat detection30
Weighted quality criteria for cyber threat intelligence: assessment and prioritisation in the MISP data model30
BLoCNet: a hybrid, dataset-independent intrusion detection system using deep learning29
Balancing usability, user experience, security and privacy in XR systems: a multidimensional approach28
Adaptive trust evaluation model based on container security analysis in the Docker platform27
Malware classification approaches utilizing binary and text encoding of permissions27
can-sleuth: Sleuthing out the capabilities, limitations, and performance impacts of automotive intrusion detection datasets27
Survey on image encryption techniques using chaotic maps in spatial, transform and spatiotemporal domains26
Xai-driven black-box adversarial attacks on network intrusion detectors26
Model-Agnostic Utility-Preserving Biometric Information Anonymization25
MEDICALHARM: A threat modeling designed for modern medical devices and a comprehensive study on effectiveness, user satisfaction, and security perspectives25
A vulnerability assessment and exploitation analysis of a powerline communication HomePlug AV network adapter25
Ensemble learning-based adaptive and adversarial techniques for APT attack detection25
Tracing the evolution of cyber resilience: a historical and conceptual review25
0.46340680122375