International Journal of Information Security

Papers
(The median citation count of International Journal of Information Security is 3. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2022-01-01 to 2026-01-01.)
ArticleCitations
BitCracker: BitLocker meets GPUs168
Verifiability for privacy-preserving computing on distributed data — a survey147
AutoPKI: public key infrastructure for IoT with automated trust transfer86
Outlier-oriented poisoning attack: a grey-box approach to disturb decision boundaries by perturbing outliers in multiclass learning67
Efficient arabic and english social spam detection using a transformer and 2D convolutional neural network-based deep learning filter64
Feature engineering impact on position falsification attacks detection in vehicular ad-hoc network60
Fast but approximate homomorphic k-means based on masking technique56
The rise of “security and privacy”: bibliometric analysis of computer privacy research54
Using machine learning to detect network intrusions in industrial control systems: a survey54
An intrusion detection approach based on incremental long short-term memory50
Systematic review of SIEM technology: SIEM-SC birth42
Automated broken object-level authorization attack detection in REST APIs through OpenAPI to colored petri nets transformation38
Adaptive trust evaluation model based on container security analysis in the Docker platform37
can-sleuth: Sleuthing out the capabilities, limitations, and performance impacts of automotive intrusion detection datasets36
Malware classification approaches utilizing binary and text encoding of permissions35
Xai-driven black-box adversarial attacks on network intrusion detectors34
Weighted quality criteria for cyber threat intelligence: assessment and prioritisation in the MISP data model34
Random resampling algorithms for addressing the imbalanced dataset classes in insider threat detection33
Fairness as a Service (FaaS): verifiable and privacy-preserving fairness auditing of machine learning systems32
Survey on image encryption techniques using chaotic maps in spatial, transform and spatiotemporal domains32
Balancing usability, user experience, security and privacy in XR systems: a multidimensional approach32
BLoCNet: a hybrid, dataset-independent intrusion detection system using deep learning31
A comprehensive approach for mitigating impersonation in online assessment: integrity policy and random authentication31
A vulnerability assessment and exploitation analysis of a powerline communication HomePlug AV network adapter30
Ensemble learning-based adaptive and adversarial techniques for APT attack detection30
Acnn: arbitrary trace attacks based on leakage area detection30
Unmasking the common traits: an ensemble approach for effective malware detection29
MEDICALHARM: A threat modeling designed for modern medical devices and a comprehensive study on effectiveness, user satisfaction, and security perspectives29
Pseudonym shuffling-driven blockchain and Autoencoder-based secure E-healthcare data management29
Enhancing phishing email detection with stylometric features and classifier stacking29
Restricting data-leakage using fine-grained access control on OSN objects27
Phish-Sight: a new approach for phishing detection using dominant colors on web pages and machine learning27
A cyber defense system against phishing attacks with deep learning game theory and LSTM-CNN with African vulture optimization algorithm (AVOA)27
A survey of anomaly detection methods for power grids27
Towards enhanced cybersecurity in industrial control systems: a systematic review of context-based modeling, digital twins, and machine learning approaches26
Model-Agnostic Utility-Preserving Biometric Information Anonymization26
Adversarial robustness of deep reinforcement learning-based intrusion detection25
Digital Twin-Enabled Incident Detection and Response: A Systematic Review of Critical Infrastructures Applications25
Tracing the evolution of cyber resilience: a historical and conceptual review24
A perspective–retrospective analysis of diversity in signature-based open-source network intrusion detection systems23
Improving spam email classification accuracy using ensemble techniques: a stacking approach23
Detection, characterization, and profiling DoH Malicious traffic using statistical pattern recognition23
“Animation” URL in NFT marketplaces considered harmful for privacy23
Securing air-gapped systems-review of covert techniques for data ex-filtration and a new clause proposal for ISO 2700122
Attribute inference privacy protection for pre-trained models22
Construction of network pentest-defense adversarial environment based on NASim22
Generating adversarial examples with collaborative generative models21
Certified unlearning for a trustworthy machine learning-based access control administration21
GaTeBaSep: game theory-based security protocol against ARP spoofing attacks in software-defined networks21
Analyzing shared keys in X.509 certificates with domain ownership21
Semi-supervised approach for detecting malicious domains in TLDs in their first query21
Deceiving supervised machine learning models via adversarial data poisoning attacks: a case study with USB keyboards20
Automated cybersecurity impact propagation across business processes using process mining techniques20
Secure outsourcing of manufacturing compliance checks19
Privacy information propagation in online social networks - a case study based on Weibo data19
Enhancing national security: a multidimensional situational awareness model for emerging economic crime prevention19
Tackling smart city security: deep learning approach utilizing feature selection and two-level cooperative framework optimized by adapted metaheuristics algorithm19
Developers’ mindset on self-adaptive privacy and its requirements for cloud computing environments19
Efficient authentication scheme for heterogeneous signcryption with cryptographic reverse firewalls for VANETs19
Unmasking SDN flow table saturation: fingerprinting, attacks and defenses19
Selfish or Malicious: Price of malice in human-centric security decision-making for attack graph-based interdependent systems19
Cross-Silo Federated Learning in Security Operations Centers for effective malware detection18
Blockchain-based data integrity framework for Internet of Things18
Generative AI for pentesting: the good, the bad, the ugly18
Business process models and simulation to enable GDPR compliance18
Advancements and challenges in privacy-preserving split learning: experimental findings and future directions17
Spatial de-correlation of generated keys from wireless channels using adversarial deep learning17
A generic framework for blockchain-assisted on-chain auditing for off-chain storage17
A systematic mapping study on security for systems of systems17
A systematic literature review on wearable health data publishing under differential privacy17
A Comprehensive User Study on Medical Device Threat Modeling Methodologies and CyberLlama2 - MEDICALHARM Threat Modeling Assistant.17
Authentication in Internet of Things, protocols, attacks, and open issues: a systematic literature review17
Cyber-security gamification in federation of cyber ranges: design, implementation, and evaluation17
Multi-cloud applications: data and code fragmentation for improved security17
Multi-user covert communication in power internet of things networks16
Interpretable information fusion and small sample dataset expansion in power system anomaly detection based on artificial intelligence algorithms16
RLET: a lightweight model for ubiquitous multi-class intrusion detection in sustainable and secured smart environment16
A blockchain-based trust and reputation model resilient to forgery attacks for data sharing scenarios (RWS-BTRM)16
Exploring the potential of deep learning and machine learning techniques for randomness analysis to enhance security on IoT16
DevSecOps practices and tools16
WEFT: a consistent and tamper-proof methodology for acquisition of automatically verifiable forensic web evidence16
Adversarial attack detection framework based on optimized weighted conditional stepwise adversarial network16
Estimating vulnerability metrics with word embedding and multiclass classification methods16
Identifying factors influencing the duration of zero-day vulnerabilities15
Malicious uses of blockchains by malware: from the analysis to Smart-Zephyrus15
A first look at references from the dark to the surface web world: a case study in Tor15
Toward a unified and secure approach for extraction of forensic digital evidence from an IoT device15
ANS-based compression and encryption with 128-bit security15
A fog-based anonymous authentication scheme with location privacy for wireless body area network with FPGA implementation15
A systematic overview on methods to protect sensitive data provided for various analyses15
Trust attack prevention based on Spark-blockchain in social IoT: a survey15
International journal of information security: a bibliometric study, 2007–202314
Adversarial attacks against mouse- and keyboard-based biometric authentication: black-box versus domain-specific techniques14
Network-Based Real-Time Detection of Data Manipulation Attacks in Industrial Control Systems14
BSDS-ShareCrypt: a blockchain-enabled framework for secure, anonymous, and accountable data sharing in cloud-IoT environments using aggregate key searchable encryption14
A Data-centric approach for safe and secure large language models against threatening and toxic content14
Abuse-freeness in contract signing: a blockchain-based proposal14
Protection of centralized SDN control plane from high-rate Packet-In messages14
Two-stage advanced persistent threat (APT) attack on an IEC 61850 power grid substation14
Comprehensive review on machine learning and deep learning techniques for malware detection in android and IoT devices14
Analysis of OSPU security effect and data assembly verification under semi-network OS architecture14
Correction: Maritime cybersecurity: protecting digital seas13
TENET: a new hybrid network architecture for adversarial defense13
PayScan: Detection and Security Analysis of Payment Libraries in Android Apps13
Selfish mining attack in blockchain: a systematic literature review13
A conflict-aware active BLE state machine learning and state coverage-guided gray-box fuzz testing method13
A comprehensive Blockchain-oriented secure framework for SDN/Fog-based IoUT12
Revisiting QUIC attacks: a comprehensive review on QUIC security and a hands-on study12
A Framework for Drift Detection and Adaptation in AI-driven Anomaly and Threat Detection Systems12
Correction to: CARNYX: A framework for vulnerability detection via power consumption analysis in embedded systems12
Generating ICS vulnerability playbooks with open standards12
An overview of proposals towards the privacy-preserving publication of trajectory data12
Novel mechanism for anonymous reporting and anonymous rewarding using blockchain technology12
Anonymous provision of privacy-sensitive services using blockchain and decentralised storage12
Non-Alpha-Num: a novel architecture for generating adversarial examples for bypassing NLP-based clickbait detection mechanisms12
A comprehensive analysis of cryptocurrency breaches at endpoint12
Challenges of post-quantum digital signing in real-world applications: a survey11
Vulnerability discovery based on source code patch commit mining: a systematic literature review11
Scalable, password-based and threshold authentication for smart homes11
Cyber–physical risk assessment for false data injection attacks considering moving target defences11
A unit-based symbolic execution method for detecting memory corruption vulnerabilities in executable codes11
Progressive attack graph: a technique for scalable and adaptive attack graph generation11
Factors influencing Swedish citizens’ willingness to provide their mobile phones to forensic examination11
Correction: Cryptocurrency recovery framework using pre-signed transaction11
Intrusion detection in IoT network using temporal wavelet augmented deep dense and LSTM auto-encoders11
Pioneering automated vulnerability detection for smart contracts in blockchain using KEVM: Guardian ADRGAN11
A deep learning approach based on multi-view consensus for SQL injection detection10
Balancing the act? Resampling versus imbalanced data for Wi-Fi IDS10
Deep behavioral analysis of machine learning algorithms against data poisoning10
SCAnME - scanner comparative analysis and metrics for evaluation10
Detecting malicious nodes using game theory and reinforcement learning in software-defined networks10
Retraction Note: Deep learning based network intrusion detection system: a systematic literature review and future scopes10
Short- versus long-term performance of detection models for obfuscated MSOffice-embedded malware9
Evaluating ASCERT: generative AI for cyber-range scenario generation9
Maritime decision-makers and cyber security: deck officers’ perception of cyber risks towards IT and OT systems9
Securing the IoT ecosystem: ASIC-based hardware realization of Ascon lightweight cipher9
Email bombing attack detection and mitigation using machine learning9
A personalized learning theory-based cyber-security training exercise9
A computationally efficient dimensionality reduction and attack classification approach for network intrusion detection9
Performance analysis of capsule networks for detecting GPS spoofing attacks on unmanned aerial vehicles9
Identifying Open-Source Threat Detection Resources on GitHub: A Scalable Machine Learning Approach9
Large language models for software vulnerability detection: a guide for researchers on models, methods, techniques, datasets, and metrics9
CARNYX: A framework for vulnerability detection via power consumption analysis in embedded systems9
Aldp-fl: an adaptive local differential privacy-based federated learning mechanism for IoT9
Efficient and interpretable SRU combined with TabNet for network intrusion detection in the big data environment9
Enhancing DevSecOps practice with Large Language Models and Security Chaos Engineering9
Federated learning for misbehaviour detection with variational autoencoders and Gaussian mixture models9
An end-to-end intrusion detection system with IoT dataset using deep learning with unsupervised feature extraction8
A comprehensive survey of phishing: mediums, intended targets, attack and defence techniques and a novel taxonomy8
Federated learning-based intrusion detection system for Internet of Things8
Investigation of application layer DDoS attacks in legacy and software-defined networks: A comprehensive review8
Blockchain-based multi-organizational cyber risk management framework for collaborative environments8
A review on digital twins for power generation and distribution8
How engaged are you? A forensic analysis of the Oura Ring Gen 3 application across iOS, Android, and Cloud platforms8
Mobile botnet detection: a comprehensive survey8
Bridging cybersecurity with digital twin technology: a thematic analysis8
Transformer or Autoencoder? Who is the ultimate adversary for attack detectors?8
From sinking to saving: MITRE ATT &CK and D3FEND frameworks for maritime cybersecurity8
Accessible password strength assessment method for visually challenged users8
Integrating the edge computing paradigm into the development of IoT forensic methodologies8
Citizens’ engagement with cybersecurity measures in Bangladesh: a cross-sectional study8
IoT device security audit tools: a comprehensive analysis and a layered architecture approach for addressing expanded security requirements8
SmartiPhish: a reinforcement learning-based intelligent anti-phishing solution to detect spoofed website attacks8
Start thinking in graphs: using graphs to address critical attack paths in a Microsoft cloud tenant8
DFTMicroagg: a dual-level anonymization algorithm for smart grid data8
Efficient searchable symmetric encryption supporting range queries8
P2ADF: a privacy-preserving attack detection framework in fog-IoT environment8
Security analysis and improvement of a privacy-preserving authentication scheme in VANET8
A Systematic Review of Voluntary Cybersecurity Standards and Frameworks7
Bi-GRU framework with entropy-augmented Mac for IoT security in SDN7
A Webshell detection method based on feature fusion and federated learning7
An interpretability security framework for intelligent decision support systems based on saliency map7
Modeling reporting delays in cyber incidents: an industry-level comparison7
Hybrid attention-enhanced explainable model for encrypted traffic detection and classification7
Blockchain and smart contract architecture for notaries services under civil law: a Brazilian experience7
Educational escape rooms for raising information privacy competences: An empirical validation7
RETRACTED ARTICLE: Deep learning based network intrusion detection system: a systematic literature review and future scopes7
From zero-shot machine learning to zero-day attack detection7
A novel hybrid hunger games algorithm for intrusion detection systems based on nonlinear regression modeling7
A comprehensive review on permissions-based Android malware detection7
Correction: Detection and mitigation of cyber-attacks in software defined networks using machine learning/deep learning: a systematic literature review, research challenges and future directions7
A cluster of patterns for trusted computing7
IFDroid: Enhancing Android Malware Detection Resilience Against Concept Drift Through API Sequence Intrinsic Features7
A blockchain-enabled collaborative intrusion detection framework for SDN-assisted cyber-physical systems7
Robust password security: a genetic programming approach with imbalanced dataset handling7
Detecting unknown vulnerabilities in smart contracts with the CNN-BiLSTM model6
Highly private blockchain-based management system for digital COVID-19 certificates6
SealFSv2: combining storage-based and ratcheting for tamper-evident logging6
A Model-Based Framework for Developing Security-Safety Incident Response Plans6
Side-channel attacks and countermeasures for heart rate retrieval from ECG characterization device6
Human factors in cybersecurity: an interdisciplinary review and framework proposal6
A review on fake news detection 3T’s: typology, time of detection, taxonomies6
Intelligent cybersecurity approach for data protection in cloud computing based Internet of Things6
Neighbor discovery protocol anomaly-based detection system using neural network algorithm6
A review of time-series analysis for cyber security analytics: from intrusion detection to attack prediction6
Insights from field experience: digital forensics of event and voyage data recorders in transportation systems accident investigation6
Unauthorized iot devices detection based on network traffic using augmentation fusion classification method6
On the detection of lateral movement through supervised machine learning and an open-source tool to create turnkey datasets from Sysmon logs6
Dependency-based security risk assessment for cyber-physical systems6
Evading malware classifiers using RL agent with action-mask6
StorjChain: overcoming the blockchain trilemma via decentralized storage and erasure-coded sharding6
Challenges and future research directions in secure multi-party computation for resource-constrained devices and large-scale computations6
A TCP-based covert channel with integrity check and retransmission6
Activity-based payments: alternative (anonymous) online payment model6
Cultivating skilled malware analysts: Clarification of practical malware dynamic analysis through interviews6
A value-based approach for information classification6
A dynamic C-V2X anonymous authentication and group key agreement protocol6
Evaluating the impact of filter-based feature selection in intrusion detection systems6
Breaking the Ultralightweight RFID Mutual Authentication Protocol: Confidentiality Under Threat6
Modeling interdependent privacy threats6
Publisher Correction: PPAM-mIoMT: a privacy-preserving authentication with device verification for securing healthcare systems in 5G networks6
Adaptive context-aware access control for IoT environments leveraging fog computing6
Blockchain-based multi-diagnosis deep learning application for various diseases classification6
A multi-objective cost–benefit optimization algorithm for network hardening6
Adversarial security mitigations of mmWave beamforming prediction models using defensive distillation and adversarial retraining6
Construction of post quantum secure authenticated key agreement protocol for dew-assisted IoT systems6
Error reduction of SRAM-based physically unclonable function for chip authentication5
GPNST: An Improved Graphical Password Authentication Scheme Leveraging Neural Style Transfer Technique on Smartphones5
A survey and characterization of Close Access Cyberspace Operations5
A cross-setting study of user unlocking behaviour in a graphical authentication scheme: a case study on android Pattern Unlock5
A review on graph-based approaches for network security monitoring and botnet detection5
A full privacy-preserving distributed batch-based certificate-less aggregate signature authentication scheme for healthcare wearable wireless medical sensor networks (HWMSNs)5
Security bug reports classification using fasttext5
Energy-efficient trust-aware secured neuro-fuzzy clustering with sparrow search optimization in wireless sensor network5
BASPED: Blockchain assisted searchable public key encryption over outsourced data5
Detection and mitigation of cyber-attacks in software defined networks using machine learning/deep learning: a systematic literature review, research challenges and future directions5
A novel frame switching model based on virtual MAC in SDN5
USB-GATE: USB-based GAN-augmented transformer reinforced defense framework for adversarial keystroke injection attacks5
A formal technique for automatic resolution of OpenFlow anomalies5
Business-layer client-side racer: dynamic security testing of the web application against client-side race condition in the business layer5
Causal effect analysis-based intrusion detection system for IoT applications5
Beyond the code: analyzing OSS developers security awareness and practices5
Cyber defense in OCPP for EV charging security risks5
Privacy and safety improvement of VANET data via a safety-related privacy scheme5
Clonable key fobs: Analyzing and breaking RKE protocols5
An efficient feature selection strategy based on bio-inspired algorithms for preventing cyber attacks in vehicular networks5
SERDUX-MARCIM: Maritime Cyberattack simulation using Dynamic Modeling, Compartmental Models in Epidemiology and Agent-based Modeling5
Optimized common features selection and deep-autoencoder (OCFSDA) for lightweight intrusion detection in Internet of things5
Differential privacy enhanced ransomware detection in cloud VMs using SMPC and bidirectional LSTM with DNN5
A typology of secure multicast communication over 5 G/6 G networks5
A survey on IoT application layer protocols, security challenges, and the role of explainable AI in IoT (XAIoT)5
From frontlines to online: examining target preferences in the Russia–Ukraine conflict5
Guiding the implementation of data privacy with microservices5
BLISS: blockchain-based integrated security system for internet of things (IoT) applications4
AIHGAT: A novel method of malware detection and homology analysis using assembly instruction heterogeneous graph4
Radio frequency fingerprinting techniques for device identification: a survey4
Revisiting Cuckoo Hash-based Unbalanced Private Set Union: Leakage Analysis and Better Construction4
LDES: detector design for version number attack detection using linear temporal logic based on discrete event system4
Random forest evaluation using multi-key homomorphic encryption and lookup tables4
Evaluating the Impact of Adversarial Patch Attacks on YOLO Models and the Implications for Edge AI Security4
0.21779108047485