International Journal of Information Security

Papers
(The median citation count of International Journal of Information Security is 2. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2021-09-01 to 2025-09-01.)
ArticleCitations
BitCracker: BitLocker meets GPUs128
The rise of “security and privacy”: bibliometric analysis of computer privacy research117
Verifiability for privacy-preserving computing on distributed data — a survey79
AutoPKI: public key infrastructure for IoT with automated trust transfer54
Anomalous behavior detection-based approach for authenticating smart home system users52
Outlier-oriented poisoning attack: a grey-box approach to disturb decision boundaries by perturbing outliers in multiclass learning50
An intrusion detection approach based on incremental long short-term memory43
Feature engineering impact on position falsification attacks detection in vehicular ad-hoc network43
Using machine learning to detect network intrusions in industrial control systems: a survey36
A content-based deep intrusion detection system32
Systematic review of SIEM technology: SIEM-SC birth31
Efficient arabic and english social spam detection using a transformer and 2D convolutional neural network-based deep learning filter30
Fast but approximate homomorphic k-means based on masking technique29
Malware classification approaches utilizing binary and text encoding of permissions28
can-sleuth: Sleuthing out the capabilities, limitations, and performance impacts of automotive intrusion detection datasets25
Fairness as a Service (FaaS): verifiable and privacy-preserving fairness auditing of machine learning systems25
A comprehensive approach for mitigating impersonation in online assessment: integrity policy and random authentication25
Random resampling algorithms for addressing the imbalanced dataset classes in insider threat detection25
Automated broken object-level authorization attack detection in REST APIs through OpenAPI to colored petri nets transformation25
Xai-driven black-box adversarial attacks on network intrusion detectors25
Balancing usability, user experience, security and privacy in XR systems: a multidimensional approach24
Adaptive trust evaluation model based on container security analysis in the Docker platform24
Weighted quality criteria for cyber threat intelligence: assessment and prioritisation in the MISP data model23
Survey on image encryption techniques using chaotic maps in spatial, transform and spatiotemporal domains23
Restricting data-leakage using fine-grained access control on OSN objects22
BLoCNet: a hybrid, dataset-independent intrusion detection system using deep learning22
A cyber defense system against phishing attacks with deep learning game theory and LSTM-CNN with African vulture optimization algorithm (AVOA)22
MEDICALHARM: A threat modeling designed for modern medical devices and a comprehensive study on effectiveness, user satisfaction, and security perspectives21
Unmasking the common traits: an ensemble approach for effective malware detection21
Acnn: arbitrary trace attacks based on leakage area detection21
Enhancing phishing email detection with stylometric features and classifier stacking20
Pseudonym shuffling-driven blockchain and Autoencoder-based secure E-healthcare data management20
Model-Agnostic Utility-Preserving Biometric Information Anonymization20
Adversarial robustness of deep reinforcement learning-based intrusion detection20
Ensemble learning-based adaptive and adversarial techniques for APT attack detection20
A vulnerability assessment and exploitation analysis of a powerline communication HomePlug AV network adapter20
Tracing the evolution of cyber resilience: a historical and conceptual review19
Improving spam email classification accuracy using ensemble techniques: a stacking approach19
A perspective–retrospective analysis of diversity in signature-based open-source network intrusion detection systems19
Digital Twin-Enabled Incident Detection and Response: A Systematic Review of Critical Infrastructures Applications19
Detection, characterization, and profiling DoH Malicious traffic using statistical pattern recognition18
“Animation” URL in NFT marketplaces considered harmful for privacy18
Unmasking SDN flow table saturation: fingerprinting, attacks and defenses18
Phish-Sight: a new approach for phishing detection using dominant colors on web pages and machine learning18
Privacy information propagation in online social networks - a case study based on Weibo data18
A survey of anomaly detection methods for power grids18
Semi-supervised approach for detecting malicious domains in TLDs in their first query17
Certified unlearning for a trustworthy machine learning-based access control administration17
Attribute inference privacy protection for pre-trained models17
GaTeBaSep: game theory-based security protocol against ARP spoofing attacks in software-defined networks16
Construction of network pentest-defense adversarial environment based on NASim16
Generating adversarial examples with collaborative generative models16
Secure outsourcing of manufacturing compliance checks16
Analyzing shared keys in X.509 certificates with domain ownership15
Cross-Silo Federated Learning in Security Operations Centers for effective malware detection15
Efficient authentication scheme for heterogeneous signcryption with cryptographic reverse firewalls for VANETs15
Authentication in Internet of Things, protocols, attacks, and open issues: a systematic literature review15
Securing air-gapped systems-review of covert techniques for data ex-filtration and a new clause proposal for ISO 2700115
Automated cybersecurity impact propagation across business processes using process mining techniques15
Developers’ mindset on self-adaptive privacy and its requirements for cloud computing environments15
Generative AI for pentesting: the good, the bad, the ugly14
Blockchain-based data integrity framework for Internet of Things14
A systematic mapping study on security for systems of systems14
Advancements and challenges in privacy-preserving split learning: experimental findings and future directions14
Business process models and simulation to enable GDPR compliance14
RLET: a lightweight model for ubiquitous multi-class intrusion detection in sustainable and secured smart environment14
A systematic literature review on wearable health data publishing under differential privacy14
Deceiving supervised machine learning models via adversarial data poisoning attacks: a case study with USB keyboards14
Spatial de-correlation of generated keys from wireless channels using adversarial deep learning13
Exploring the potential of deep learning and machine learning techniques for randomness analysis to enhance security on IoT13
Multi-cloud applications: data and code fragmentation for improved security13
WEFT: a consistent and tamper-proof methodology for acquisition of automatically verifiable forensic web evidence13
A generic framework for blockchain-assisted on-chain auditing for off-chain storage13
Estimating vulnerability metrics with word embedding and multiclass classification methods13
Cyber-security gamification in federation of cyber ranges: design, implementation, and evaluation13
Adversarial attack detection framework based on optimized weighted conditional stepwise adversarial network13
A fog-based anonymous authentication scheme with location privacy for wireless body area network with FPGA implementation12
Adversarial attacks against mouse- and keyboard-based biometric authentication: black-box versus domain-specific techniques12
Identifying factors influencing the duration of zero-day vulnerabilities12
Comprehensive review on machine learning and deep learning techniques for malware detection in android and IoT devices12
A Comprehensive User Study on Medical Device Threat Modeling Methodologies and CyberLlama2 - MEDICALHARM Threat Modeling Assistant.12
Multi-user covert communication in power internet of things networks12
International journal of information security: a bibliometric study, 2007–202312
Toward a unified and secure approach for extraction of forensic digital evidence from an IoT device12
DevSecOps practices and tools12
Trust attack prevention based on Spark-blockchain in social IoT: a survey12
A Data-centric approach for safe and secure large language models against threatening and toxic content12
ANS-based compression and encryption with 128-bit security11
Malicious uses of blockchains by malware: from the analysis to Smart-Zephyrus11
PayScan: Detection and Security Analysis of Payment Libraries in Android Apps11
Two-stage advanced persistent threat (APT) attack on an IEC 61850 power grid substation11
Abuse-freeness in contract signing: a blockchain-based proposal11
A first look at references from the dark to the surface web world: a case study in Tor11
A systematic overview on methods to protect sensitive data provided for various analyses11
A comprehensive Blockchain-oriented secure framework for SDN/Fog-based IoUT11
Correction: Maritime cybersecurity: protecting digital seas11
Anonymous provision of privacy-sensitive services using blockchain and decentralised storage10
Generating ICS vulnerability playbooks with open standards10
Selfish mining attack in blockchain: a systematic literature review10
Challenges of post-quantum digital signing in real-world applications: a survey10
An overview of proposals towards the privacy-preserving publication of trajectory data10
A conflict-aware active BLE state machine learning and state coverage-guided gray-box fuzz testing method10
TENET: a new hybrid network architecture for adversarial defense10
Novel mechanism for anonymous reporting and anonymous rewarding using blockchain technology10
Analysis of OSPU security effect and data assembly verification under semi-network OS architecture10
A comprehensive analysis of cryptocurrency breaches at endpoint10
A unit-based symbolic execution method for detecting memory corruption vulnerabilities in executable codes9
Revisiting QUIC attacks: a comprehensive review on QUIC security and a hands-on study9
Vulnerability discovery based on source code patch commit mining: a systematic literature review9
Federated learning for misbehaviour detection with variational autoencoders and Gaussian mixture models9
Non-Alpha-Num: a novel architecture for generating adversarial examples for bypassing NLP-based clickbait detection mechanisms9
Cyber–physical risk assessment for false data injection attacks considering moving target defences9
Factors influencing Swedish citizens’ willingness to provide their mobile phones to forensic examination9
Efficient and interpretable SRU combined with TabNet for network intrusion detection in the big data environment9
Retraction Note: Deep learning based network intrusion detection system: a systematic literature review and future scopes9
Protection of centralized SDN control plane from high-rate Packet-In messages9
Performance analysis of capsule networks for detecting GPS spoofing attacks on unmanned aerial vehicles9
Correction: Cryptocurrency recovery framework using pre-signed transaction9
Deep behavioral analysis of machine learning algorithms against data poisoning9
A computationally efficient dimensionality reduction and attack classification approach for network intrusion detection8
Securing the IoT ecosystem: ASIC-based hardware realization of Ascon lightweight cipher8
Large language models for software vulnerability detection: a guide for researchers on models, methods, techniques, datasets, and metrics8
Email bombing attack detection and mitigation using machine learning8
Pioneering automated vulnerability detection for smart contracts in blockchain using KEVM: Guardian ADRGAN8
Scalable, password-based and threshold authentication for smart homes8
Enhancing DevSecOps practice with Large Language Models and Security Chaos Engineering8
Maritime decision-makers and cyber security: deck officers’ perception of cyber risks towards IT and OT systems8
Identifying Open-Source Threat Detection Resources on GitHub: A Scalable Machine Learning Approach8
Detecting malicious nodes using game theory and reinforcement learning in software-defined networks8
Balancing the act? Resampling versus imbalanced data for Wi-Fi IDS8
A deep learning approach based on multi-view consensus for SQL injection detection8
SCAnME - scanner comparative analysis and metrics for evaluation8
DFTMicroagg: a dual-level anonymization algorithm for smart grid data7
CARNYX: A framework for vulnerability detection via power consumption analysis in embedded systems7
An end-to-end intrusion detection system with IoT dataset using deep learning with unsupervised feature extraction7
Aldp-fl: an adaptive local differential privacy-based federated learning mechanism for IoT7
SmartiPhish: a reinforcement learning-based intelligent anti-phishing solution to detect spoofed website attacks7
A personalized learning theory-based cyber-security training exercise7
Short- versus long-term performance of detection models for obfuscated MSOffice-embedded malware7
Transformer or Autoencoder? Who is the ultimate adversary for attack detectors?7
Federated learning-based intrusion detection system for Internet of Things7
A comprehensive survey of phishing: mediums, intended targets, attack and defence techniques and a novel taxonomy7
P2ADF: a privacy-preserving attack detection framework in fog-IoT environment6
Start thinking in graphs: using graphs to address critical attack paths in a Microsoft cloud tenant6
Mobile botnet detection: a comprehensive survey6
Blockchain and smart contract architecture for notaries services under civil law: a Brazilian experience6
A Webshell detection method based on feature fusion and federated learning6
Robust password security: a genetic programming approach with imbalanced dataset handling6
Security analysis and improvement of a privacy-preserving authentication scheme in VANET6
Citizens’ engagement with cybersecurity measures in Bangladesh: a cross-sectional study6
A review on digital twins for power generation and distribution6
From sinking to saving: MITRE ATT &CK and D3FEND frameworks for maritime cybersecurity6
Integrating the edge computing paradigm into the development of IoT forensic methodologies6
Accessible password strength assessment method for visually challenged users6
From zero-shot machine learning to zero-day attack detection6
Blockchain-based multi-organizational cyber risk management framework for collaborative environments6
IoT device security audit tools: a comprehensive analysis and a layered architecture approach for addressing expanded security requirements6
Investigation of application layer DDoS attacks in legacy and software-defined networks: A comprehensive review6
A risk-level assessment system based on the STRIDE/DREAD model for digital data marketplaces6
An interpretability security framework for intelligent decision support systems based on saliency map6
A cluster of patterns for trusted computing6
Educational escape rooms for raising information privacy competences: An empirical validation6
Efficient searchable symmetric encryption supporting range queries6
How engaged are you? A forensic analysis of the Oura Ring Gen 3 application across iOS, Android, and Cloud platforms6
On the detection of lateral movement through supervised machine learning and an open-source tool to create turnkey datasets from Sysmon logs5
Detecting unknown vulnerabilities in smart contracts with the CNN-BiLSTM model5
Construction of post quantum secure authenticated key agreement protocol for dew-assisted IoT systems5
Intelligent cybersecurity approach for data protection in cloud computing based Internet of Things5
A comprehensive review on permissions-based Android malware detection5
Cultivating skilled malware analysts: Clarification of practical malware dynamic analysis through interviews5
Neighbor discovery protocol anomaly-based detection system using neural network algorithm5
SealFSv2: combining storage-based and ratcheting for tamper-evident logging5
A review of time-series analysis for cyber security analytics: from intrusion detection to attack prediction5
RETRACTED ARTICLE: Deep learning based network intrusion detection system: a systematic literature review and future scopes5
Insights from field experience: digital forensics of event and voyage data recorders in transportation systems accident investigation5
A novel hybrid hunger games algorithm for intrusion detection systems based on nonlinear regression modeling5
Evaluating the impact of filter-based feature selection in intrusion detection systems5
Human factors in cybersecurity: an interdisciplinary review and framework proposal5
Adversarial security mitigations of mmWave beamforming prediction models using defensive distillation and adversarial retraining5
Challenges and future research directions in secure multi-party computation for resource-constrained devices and large-scale computations5
A blockchain-enabled collaborative intrusion detection framework for SDN-assisted cyber-physical systems5
Modeling reporting delays in cyber incidents: an industry-level comparison5
A dynamic C-V2X anonymous authentication and group key agreement protocol5
Hybrid attention-enhanced explainable model for encrypted traffic detection and classification5
Blockchain-based multi-diagnosis deep learning application for various diseases classification5
A multi-objective cost–benefit optimization algorithm for network hardening5
Activity-based payments: alternative (anonymous) online payment model5
A TCP-based covert channel with integrity check and retransmission5
From frontlines to online: examining target preferences in the Russia–Ukraine conflict4
Error reduction of SRAM-based physically unclonable function for chip authentication4
Privacy and safety improvement of VANET data via a safety-related privacy scheme4
Side-channel attacks and countermeasures for heart rate retrieval from ECG characterization device4
Dependency-based security risk assessment for cyber-physical systems4
Cyber defense in OCPP for EV charging security risks4
Optimized common features selection and deep-autoencoder (OCFSDA) for lightweight intrusion detection in Internet of things4
Accountable privacy preserving attribute-based access control for cloud services enforced using blockchain4
Business-layer client-side racer: dynamic security testing of the web application against client-side race condition in the business layer4
Security bug reports classification using fasttext4
A typology of secure multicast communication over 5 G/6 G networks4
A review on fake news detection 3T’s: typology, time of detection, taxonomies4
GPNST: An Improved Graphical Password Authentication Scheme Leveraging Neural Style Transfer Technique on Smartphones4
Publisher Correction: PPAM-mIoMT: a privacy-preserving authentication with device verification for securing healthcare systems in 5G networks4
Adaptive context-aware access control for IoT environments leveraging fog computing4
Guiding the implementation of data privacy with microservices4
A novel frame switching model based on virtual MAC in SDN4
A survey on IoT application layer protocols, security challenges, and the role of explainable AI in IoT (XAIoT)4
A review on graph-based approaches for network security monitoring and botnet detection4
Beyond the code: analyzing OSS developers security awareness and practices4
USB-GATE: USB-based GAN-augmented transformer reinforced defense framework for adversarial keystroke injection attacks4
Clonable key fobs: Analyzing and breaking RKE protocols4
StorjChain: overcoming the blockchain trilemma via decentralized storage and erasure-coded sharding4
Evading malware classifiers using RL agent with action-mask4
Highly private blockchain-based management system for digital COVID-19 certificates4
BASPED: Blockchain assisted searchable public key encryption over outsourced data4
Energy-efficient trust-aware secured neuro-fuzzy clustering with sparrow search optimization in wireless sensor network4
A full privacy-preserving distributed batch-based certificate-less aggregate signature authentication scheme for healthcare wearable wireless medical sensor networks (HWMSNs)4
Causal effect analysis-based intrusion detection system for IoT applications4
SERDUX-MARCIM: Maritime Cyberattack simulation using Dynamic Modeling, Compartmental Models in Epidemiology and Agent-based Modeling4
A survey and characterization of Close Access Cyberspace Operations4
Secure multi-party computation with legally-enforceable fairness3
PRAU-GIN: GIN-based android malware classification with traffic refinement and node augmentation3
A cross-setting study of user unlocking behaviour in a graphical authentication scheme: a case study on android Pattern Unlock3
INCHAIN: a cyber insurance architecture with smart contracts and self-sovereign identity on top of blockchain3
Distributed access control for information-centric networking architectures using verifiable credentials3
A simple and secure user authentication scheme using Map Street View with usability analysis based on ISO/IEC 250223
Random forest evaluation using multi-key homomorphic encryption and lookup tables3
Correction: Real-time detection of deception attacks in cyber-physical systems3
Evaluating the Impact of Adversarial Patch Attacks on YOLO Models and the Implications for Edge AI Security3
AIHGAT: A novel method of malware detection and homology analysis using assembly instruction heterogeneous graph3
A formal technique for automatic resolution of OpenFlow anomalies3
Malicious code detection in android: the role of sequence characteristics and disassembling methods3
Benchmarking the security protocol and data model (SPDM) for component authentication3
Synthetic data: revisiting the privacy-utility trade-off3
LDES: detector design for version number attack detection using linear temporal logic based on discrete event system3
Malicious website identification using design attribute learning3
RADS: a real-time anomaly detection model for software-defined networks using machine learning3
Evaluation of the maturity of LLMs in the cybersecurity domain3
A dual-stage deep learning approach for robust detection and identification of hardware trojans using monte-carlo dropout3
Bu-Dash: a universal and dynamic graphical password scheme (extended version)3
MAPAS: a practical deep learning-based android malware detection system3
Octopus: privacy preserving peer-to-peer transactions system with InterPlanetary file system (IPFS)3
A survey on malware attacks in industrial air-gap systems3
Revisiting Cuckoo Hash-based Unbalanced Private Set Union: Leakage Analysis and Better Construction3
Brave-sdn: blockchain-reliant authentication for versatile east–west bound in distributed SDNs3
Data space randomization for securing cyber-physical systems3
Cybersecurity training and healthcare: the AERAS approach3
TL-BILSTM IoT: transfer learning model for prediction of intrusion detection system in IoT environment3
Radio frequency fingerprinting techniques for device identification: a survey3
Filter aggregation for DDoS prevention systems: hardware perspective3
Trust management in the internet of vehicles: a systematic literature review of blockchain integration3
0.02593994140625