International Journal of Information Security

Papers
(The median citation count of International Journal of Information Security is 4. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2022-05-01 to 2026-05-01.)
ArticleCitations
BitCracker: BitLocker meets GPUs214
AutoPKI: public key infrastructure for IoT with automated trust transfer92
Verifiability for privacy-preserving computing on distributed data — a survey80
Using machine learning to detect network intrusions in industrial control systems: a survey77
The rise of “security and privacy”: bibliometric analysis of computer privacy research66
Outlier-oriented poisoning attack: a grey-box approach to disturb decision boundaries by perturbing outliers in multiclass learning63
Efficient arabic and english social spam detection using a transformer and 2D convolutional neural network-based deep learning filter58
Fast but approximate homomorphic k-means based on masking technique57
Systematic review of SIEM technology: SIEM-SC birth49
Feature engineering impact on position falsification attacks detection in vehicular ad-hoc network48
An intrusion detection approach based on incremental long short-term memory47
Weighted quality criteria for cyber threat intelligence: assessment and prioritisation in the MISP data model47
Malware classification approaches utilizing binary and text encoding of permissions45
Balancing usability, user experience, security and privacy in XR systems: a multidimensional approach44
A comprehensive approach for mitigating impersonation in online assessment: integrity policy and random authentication44
Fairness as a Service (FaaS): verifiable and privacy-preserving fairness auditing of machine learning systems44
Xai-driven black-box adversarial attacks on network intrusion detectors43
BLoCNet: a hybrid, dataset-independent intrusion detection system using deep learning42
can-sleuth: Sleuthing out the capabilities, limitations, and performance impacts of automotive intrusion detection datasets42
Adaptive trust evaluation model based on container security analysis in the Docker platform41
Automated broken object-level authorization attack detection in REST APIs through OpenAPI to colored petri nets transformation41
Random resampling algorithms for addressing the imbalanced dataset classes in insider threat detection40
A vulnerability assessment and exploitation analysis of a powerline communication HomePlug AV network adapter39
Acnn: arbitrary trace attacks based on leakage area detection38
Restricting data-leakage using fine-grained access control on OSN objects37
A perspective–retrospective analysis of diversity in signature-based open-source network intrusion detection systems36
Pseudonym shuffling-driven blockchain and Autoencoder-based secure E-healthcare data management35
Explainable AI based dynamic cybersecurity risk management for cyber insurability35
MEDICALHARM: A threat modeling designed for modern medical devices and a comprehensive study on effectiveness, user satisfaction, and security perspectives35
Unmasking the common traits: an ensemble approach for effective malware detection33
Towards enhanced cybersecurity in industrial control systems: a systematic review of context-based modeling, digital twins, and machine learning approaches33
Model-Agnostic Utility-Preserving Biometric Information Anonymization33
Ensemble learning-based adaptive and adversarial techniques for APT attack detection32
A large scale analysis of code security in public repositories32
A survey of anomaly detection methods for power grids31
Tracing the evolution of cyber resilience: a historical and conceptual review30
Detection, characterization, and profiling DoH Malicious traffic using statistical pattern recognition30
Phish-Sight: a new approach for phishing detection using dominant colors on web pages and machine learning30
Adversarial robustness of deep reinforcement learning-based intrusion detection29
A cyber defense system against phishing attacks with deep learning game theory and LSTM-CNN with African vulture optimization algorithm (AVOA)28
Enhancing phishing email detection with stylometric features and classifier stacking28
Digital Twin-Enabled Incident Detection and Response: A Systematic Review of Critical Infrastructures Applications28
Improving spam email classification accuracy using ensemble techniques: a stacking approach27
Attribute inference privacy protection for pre-trained models27
“Animation” URL in NFT marketplaces considered harmful for privacy27
Securing air-gapped systems-review of covert techniques for data ex-filtration and a new clause proposal for ISO 2700126
Semi-supervised approach for detecting malicious domains in TLDs in their first query25
Certified unlearning for a trustworthy machine learning-based access control administration25
Construction of network pentest-defense adversarial environment based on NASim25
Analyzing shared keys in X.509 certificates with domain ownership24
Selfish or Malicious: Price of malice in human-centric security decision-making for attack graph-based interdependent systems24
Automated cybersecurity impact propagation across business processes using process mining techniques24
Deceiving supervised machine learning models via adversarial data poisoning attacks: a case study with USB keyboards24
Privacy information propagation in online social networks - a case study based on Weibo data24
GaTeBaSep: game theory-based security protocol against ARP spoofing attacks in software-defined networks24
Enhancing national security: a multidimensional situational awareness model for emerging economic crime prevention24
Secure outsourcing of manufacturing compliance checks24
BuKc: A novel bottom-up approach for enhanced data anonymization in apache spark23
From Prey to Protect: Exploring Social Engineering Through Games and Simulation. Trust, Awareness, and Phishing Defense23
Developers’ mindset on self-adaptive privacy and its requirements for cloud computing environments23
Cross-Silo Federated Learning in Security Operations Centers for effective malware detection23
Tackling smart city security: deep learning approach utilizing feature selection and two-level cooperative framework optimized by adapted metaheuristics algorithm23
Efficient authentication scheme for heterogeneous signcryption with cryptographic reverse firewalls for VANETs23
Generative AI for pentesting: the good, the bad, the ugly22
Generating adversarial examples with collaborative generative models22
A systematic mapping study on security for systems of systems22
Authentication in Internet of Things, protocols, attacks, and open issues: a systematic literature review22
Business process models and simulation to enable GDPR compliance22
Advancements and challenges in privacy-preserving split learning: experimental findings and future directions22
Unmasking SDN flow table saturation: fingerprinting, attacks and defenses22
Blockchain-based data integrity framework for Internet of Things22
Selected papers from the 29th European Symposium on Research in Computer Security (by invite-only)21
Multi-cloud applications: data and code fragmentation for improved security21
Spatial de-correlation of generated keys from wireless channels using adversarial deep learning21
A generic framework for blockchain-assisted on-chain auditing for off-chain storage21
Exploring the potential of deep learning and machine learning techniques for randomness analysis to enhance security on IoT20
Interpretable information fusion and small sample dataset expansion in power system anomaly detection based on artificial intelligence algorithms20
A Comprehensive User Study on Medical Device Threat Modeling Methodologies and CyberLlama2 - MEDICALHARM Threat Modeling Assistant.20
Cyber-security gamification in federation of cyber ranges: design, implementation, and evaluation20
WEFT: a consistent and tamper-proof methodology for acquisition of automatically verifiable forensic web evidence19
Multi-user covert communication in power internet of things networks19
Adversarial attack detection framework based on optimized weighted conditional stepwise adversarial network19
RLET: a lightweight model for ubiquitous multi-class intrusion detection in sustainable and secured smart environment19
Estimating vulnerability metrics with word embedding and multiclass classification methods19
DevSecOps practices and tools19
Network-Based Real-Time Detection of Data Manipulation Attacks in Industrial Control Systems18
Comprehensive review on machine learning and deep learning techniques for malware detection in android and IoT devices18
Malicious uses of blockchains by malware: from the analysis to Smart-Zephyrus18
A fog-based anonymous authentication scheme with location privacy for wireless body area network with FPGA implementation18
A Data-centric approach for safe and secure large language models against threatening and toxic content18
International journal of information security: a bibliometric study, 2007–202318
Two-stage advanced persistent threat (APT) attack on an IEC 61850 power grid substation17
Identifying factors influencing the duration of zero-day vulnerabilities17
BSDS-ShareCrypt: a blockchain-enabled framework for secure, anonymous, and accountable data sharing in cloud-IoT environments using aggregate key searchable encryption17
Adversarial attacks against mouse- and keyboard-based biometric authentication: black-box versus domain-specific techniques17
Toward a unified and secure approach for extraction of forensic digital evidence from an IoT device17
Trust attack prevention based on Spark-blockchain in social IoT: a survey17
A blockchain-based trust and reputation model resilient to forgery attacks for data sharing scenarios (RWS-BTRM)17
A comprehensive Blockchain-oriented secure framework for SDN/Fog-based IoUT16
Correction to: CARNYX: A framework for vulnerability detection via power consumption analysis in embedded systems16
TENET: a new hybrid network architecture for adversarial defense16
ANS-based compression and encryption with 128-bit security16
Generating ICS vulnerability playbooks with open standards16
Correction: Maritime cybersecurity: protecting digital seas16
Analysis of OSPU security effect and data assembly verification under semi-network OS architecture16
A Framework for Drift Detection and Adaptation in AI-driven Anomaly and Threat Detection Systems16
A conflict-aware active BLE state machine learning and state coverage-guided gray-box fuzz testing method16
A systematic overview on methods to protect sensitive data provided for various analyses16
PayScan: Detection and Security Analysis of Payment Libraries in Android Apps15
A unit-based symbolic execution method for detecting memory corruption vulnerabilities in executable codes15
Cyber–physical risk assessment for false data injection attacks considering moving target defences15
A comprehensive analysis of cryptocurrency breaches at endpoint15
Abuse-freeness in contract signing: a blockchain-based proposal15
FKSS: A fast keyword search scheme with access control for cloud-assisted edge computing15
Novel mechanism for anonymous reporting and anonymous rewarding using blockchain technology15
Selfish mining attack in blockchain: a systematic literature review15
Revisiting QUIC attacks: a comprehensive review on QUIC security and a hands-on study14
Pioneering automated vulnerability detection for smart contracts in blockchain using KEVM: Guardian ADRGAN14
Efficient and interpretable SRU combined with TabNet for network intrusion detection in the big data environment14
Protection of centralized SDN control plane from high-rate Packet-In messages14
Anonymous provision of privacy-sensitive services using blockchain and decentralised storage14
Performance analysis of capsule networks for detecting GPS spoofing attacks on unmanned aerial vehicles14
An overview of proposals towards the privacy-preserving publication of trajectory data14
Factors influencing Swedish citizens’ willingness to provide their mobile phones to forensic examination14
Large language models for software vulnerability detection: a guide for researchers on models, methods, techniques, datasets, and metrics14
Non-Alpha-Num: a novel architecture for generating adversarial examples for bypassing NLP-based clickbait detection mechanisms14
Designated-verifier zk-SNARKs made easy13
A computationally efficient dimensionality reduction and attack classification approach for network intrusion detection13
Retraction Note: Deep learning based network intrusion detection system: a systematic literature review and future scopes13
Maritime decision-makers and cyber security: deck officers’ perception of cyber risks towards IT and OT systems13
Vulnerability discovery based on source code patch commit mining: a systematic literature review13
Email bombing attack detection and mitigation using machine learning13
Identifying Open-Source Threat Detection Resources on GitHub: A Scalable Machine Learning Approach13
Correction: Cryptocurrency recovery framework using pre-signed transaction13
Progressive attack graph: a technique for scalable and adaptive attack graph generation13
Intrusion detection in IoT network using temporal wavelet augmented deep dense and LSTM auto-encoders13
Balancing the act? Resampling versus imbalanced data for Wi-Fi IDS12
SCAnME - scanner comparative analysis and metrics for evaluation12
Enhancing DevSecOps practice with Large Language Models and Security Chaos Engineering12
Securing the IoT ecosystem: ASIC-based hardware realization of Ascon lightweight cipher12
A deep learning approach based on multi-view consensus for SQL injection detection12
Detecting malicious nodes using game theory and reinforcement learning in software-defined networks12
Federated learning for misbehaviour detection with variational autoencoders and Gaussian mixture models12
Deep behavioral analysis of machine learning algorithms against data poisoning12
CARNYX: A framework for vulnerability detection via power consumption analysis in embedded systems11
A personalized learning theory-based cyber-security training exercise11
Transformer or Autoencoder? Who is the ultimate adversary for attack detectors?11
Short- versus long-term performance of detection models for obfuscated MSOffice-embedded malware11
Bridging cybersecurity with digital twin technology: a thematic analysis11
A comprehensive survey of phishing: mediums, intended targets, attack and defence techniques and a novel taxonomy11
Evaluating ASCERT: generative AI for cyber-range scenario generation11
Aldp-fl: an adaptive local differential privacy-based federated learning mechanism for IoT11
Federated learning-based intrusion detection system for Internet of Things11
P2ADF: a privacy-preserving attack detection framework in fog-IoT environment10
DFTMicroagg: a dual-level anonymization algorithm for smart grid data10
Share and benefit: incentives for cyber threat intelligence sharing10
Security analysis and improvement of a privacy-preserving authentication scheme in VANET10
SmartiPhish: a reinforcement learning-based intelligent anti-phishing solution to detect spoofed website attacks10
How engaged are you? A forensic analysis of the Oura Ring Gen 3 application across iOS, Android, and Cloud platforms10
Mobile botnet detection: a comprehensive survey10
An end-to-end intrusion detection system with IoT dataset using deep learning with unsupervised feature extraction10
Start thinking in graphs: using graphs to address critical attack paths in a Microsoft cloud tenant10
From sinking to saving: MITRE ATT &CK and D3FEND frameworks for maritime cybersecurity9
Integrating the edge computing paradigm into the development of IoT forensic methodologies9
IFDroid: Enhancing Android Malware Detection Resilience Against Concept Drift Through API Sequence Intrinsic Features9
From zero-shot machine learning to zero-day attack detection9
An interpretability security framework for intelligent decision support systems based on saliency map9
IoT device security audit tools: a comprehensive analysis and a layered architecture approach for addressing expanded security requirements9
Efficient searchable symmetric encryption supporting range queries9
Bi-GRU framework with entropy-augmented Mac for IoT security in SDN9
Correction: Detection and mitigation of cyber-attacks in software defined networks using machine learning/deep learning: a systematic literature review, research challenges and future directions9
Investigation of application layer DDoS attacks in legacy and software-defined networks: A comprehensive review9
Citizens’ engagement with cybersecurity measures in Bangladesh: a cross-sectional study9
A review on digital twins for power generation and distribution9
Accessible password strength assessment method for visually challenged users9
Blockchain-based multi-organizational cyber risk management framework for collaborative environments9
A Webshell detection method based on feature fusion and federated learning9
A review of time-series analysis for cyber security analytics: from intrusion detection to attack prediction8
A novel hybrid hunger games algorithm for intrusion detection systems based on nonlinear regression modeling8
Construction of post quantum secure authenticated key agreement protocol for dew-assisted IoT systems8
Context-based and investment decision-making cyber resilient systems: an empirical approach8
On the detection of lateral movement through supervised machine learning and an open-source tool to create turnkey datasets from Sysmon logs8
Adversarial security mitigations of mmWave beamforming prediction models using defensive distillation and adversarial retraining8
Intelligent cybersecurity approach for data protection in cloud computing based Internet of Things8
A comprehensive review on permissions-based Android malware detection8
Educational escape rooms for raising information privacy competences: An empirical validation8
A value-based approach for information classification8
Robust password security: a genetic programming approach with imbalanced dataset handling8
Insights from field experience: digital forensics of event and voyage data recorders in transportation systems accident investigation8
A Systematic Review of Voluntary Cybersecurity Standards and Frameworks8
Modeling reporting delays in cyber incidents: an industry-level comparison8
Detecting unknown vulnerabilities in smart contracts with the CNN-BiLSTM model8
Hybrid attention-enhanced explainable model for encrypted traffic detection and classification8
Evaluating the impact of filter-based feature selection in intrusion detection systems8
A cluster of patterns for trusted computing8
Blockchain and smart contract architecture for notaries services under civil law: a Brazilian experience8
A dynamic C-V2X anonymous authentication and group key agreement protocol8
A blockchain-enabled collaborative intrusion detection framework for SDN-assisted cyber-physical systems8
Activity-based payments: alternative (anonymous) online payment model8
RETRACTED ARTICLE: Deep learning based network intrusion detection system: a systematic literature review and future scopes8
Breaking the Ultralightweight RFID Mutual Authentication Protocol: Confidentiality Under Threat7
A review on fake news detection 3T’s: typology, time of detection, taxonomies7
Blockchain-based multi-diagnosis deep learning application for various diseases classification7
Side-channel attacks and countermeasures for heart rate retrieval from ECG characterization device7
Publisher Correction: PPAM-mIoMT: a privacy-preserving authentication with device verification for securing healthcare systems in 5G networks7
Challenges and future research directions in secure multi-party computation for resource-constrained devices and large-scale computations7
A TCP-based covert channel with integrity check and retransmission7
SealFSv2: combining storage-based and ratcheting for tamper-evident logging7
Unauthorized iot devices detection based on network traffic using augmentation fusion classification method7
Adaptive context-aware access control for IoT environments leveraging fog computing7
Modeling interdependent privacy threats7
Evading malware classifiers using RL agent with action-mask7
Cultivating skilled malware analysts: Clarification of practical malware dynamic analysis through interviews7
Highly private blockchain-based management system for digital COVID-19 certificates7
Neighbor discovery protocol anomaly-based detection system using neural network algorithm7
Human factors in cybersecurity: an interdisciplinary review and framework proposal7
GPNST: An Improved Graphical Password Authentication Scheme Leveraging Neural Style Transfer Technique on Smartphones7
From frontlines to online: examining target preferences in the Russia–Ukraine conflict7
A secure and scalable home security system using IoT, 6G networks, AI-based hybrid deep learning models, blockchain, and smart contracts6
A cross-setting study of user unlocking behaviour in a graphical authentication scheme: a case study on android Pattern Unlock6
Business-layer client-side racer: dynamic security testing of the web application against client-side race condition in the business layer6
Causal effect analysis-based intrusion detection system for IoT applications6
Security bug reports classification using fasttext6
A survey and characterization of Close Access Cyberspace Operations6
Detection and mitigation of cyber-attacks in software defined networks using machine learning/deep learning: a systematic literature review, research challenges and future directions6
Privacy and safety improvement of VANET data via a safety-related privacy scheme6
BASPED: Blockchain assisted searchable public key encryption over outsourced data6
Guiding the implementation of data privacy with microservices6
A full privacy-preserving distributed batch-based certificate-less aggregate signature authentication scheme for healthcare wearable wireless medical sensor networks (HWMSNs)6
Benchmarking the security protocol and data model (SPDM) for component authentication6
A formal technique for automatic resolution of OpenFlow anomalies6
Optimized common features selection and deep-autoencoder (OCFSDA) for lightweight intrusion detection in Internet of things6
SERDUX-MARCIM: Maritime Cyberattack simulation using Dynamic Modeling, Compartmental Models in Epidemiology and Agent-based Modeling6
StorjChain: overcoming the blockchain trilemma via decentralized storage and erasure-coded sharding6
A novel frame switching model based on virtual MAC in SDN6
Cyber defense in OCPP for EV charging security risks6
A Model-Based Framework for Developing Security-Safety Incident Response Plans6
A typology of secure multicast communication over 5 G/6 G networks6
Differential privacy enhanced ransomware detection in cloud VMs using SMPC and bidirectional LSTM with DNN6
Cookie Baker: gray-box login automation for web application security testing6
How to Verifiably Encrypt Many Bits for an Election?6
A survey on IoT application layer protocols, security challenges, and the role of explainable AI in IoT (XAIoT)6
A review on graph-based approaches for network security monitoring and botnet detection6
USB-GATE: USB-based GAN-augmented transformer reinforced defense framework for adversarial keystroke injection attacks6
Beyond the code: analyzing OSS developers security awareness and practices6
Energy-efficient trust-aware secured neuro-fuzzy clustering with sparrow search optimization in wireless sensor network6
An efficient feature selection strategy based on bio-inspired algorithms for preventing cyber attacks in vehicular networks6
Dependency-based security risk assessment for cyber-physical systems6
Error reduction of SRAM-based physically unclonable function for chip authentication6
Clonable key fobs: Analyzing and breaking RKE protocols6
0.32405805587769