International Journal of Information Security

Papers
(The TQCC of International Journal of Information Security is 6. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2021-06-01 to 2025-06-01.)
ArticleCitations
BitCracker: BitLocker meets GPUs115
Fast but approximate homomorphic k-means based on masking technique90
The rise of “security and privacy”: bibliometric analysis of computer privacy research70
Feature engineering impact on position falsification attacks detection in vehicular ad-hoc network47
An intrusion detection approach based on incremental long short-term memory46
Using machine learning to detect network intrusions in industrial control systems: a survey38
AutoPKI: public key infrastructure for IoT with automated trust transfer38
Anomalous behavior detection-based approach for authenticating smart home system users34
Outlier-oriented poisoning attack: a grey-box approach to disturb decision boundaries by perturbing outliers in multiclass learning32
A content-based deep intrusion detection system29
Verifiability for privacy-preserving computing on distributed data — a survey26
Systematic review of SIEM technology: SIEM-SC birth26
Efficient arabic and english social spam detection using a transformer and 2D convolutional neural network-based deep learning filter26
Random resampling algorithms for addressing the imbalanced dataset classes in insider threat detection24
Malware classification approaches utilizing binary and text encoding of permissions24
Optimization of parallel firewalls filtering rules23
A comprehensive approach for mitigating impersonation in online assessment: integrity policy and random authentication23
Fairness as a Service (FaaS): verifiable and privacy-preserving fairness auditing of machine learning systems22
BLoCNet: a hybrid, dataset-independent intrusion detection system using deep learning20
Xai-driven black-box adversarial attacks on network intrusion detectors20
Balancing usability, user experience, security and privacy in XR systems: a multidimensional approach20
Survey on image encryption techniques using chaotic maps in spatial, transform and spatiotemporal domains20
Automated broken object-level authorization attack detection in REST APIs through OpenAPI to colored petri nets transformation20
Unmasking the common traits: an ensemble approach for effective malware detection18
Acnn: arbitrary trace attacks based on leakage area detection18
A cyber defense system against phishing attacks with deep learning game theory and LSTM-CNN with African vulture optimization algorithm (AVOA)18
MEDICALHARM: A threat modeling designed for modern medical devices and a comprehensive study on effectiveness, user satisfaction, and security perspectives18
Phish-Sight: a new approach for phishing detection using dominant colors on web pages and machine learning17
Enhancing phishing email detection with stylometric features and classifier stacking17
Adversarial robustness of deep reinforcement learning-based intrusion detection17
Detection, characterization, and profiling DoH Malicious traffic using statistical pattern recognition16
Restricting data-leakage using fine-grained access control on OSN objects16
A survey of anomaly detection methods for power grids16
Improving spam email classification accuracy using ensemble techniques: a stacking approach15
Model-Agnostic Utility-Preserving Biometric Information Anonymization15
GaTeBaSep: game theory-based security protocol against ARP spoofing attacks in software-defined networks15
Tracing the evolution of cyber resilience: a historical and conceptual review15
“Animation” URL in NFT marketplaces considered harmful for privacy15
Secure outsourcing of manufacturing compliance checks15
A perspective–retrospective analysis of diversity in signature-based open-source network intrusion detection systems15
A systematic mapping study on security for systems of systems15
Attribute inference privacy protection for pre-trained models14
Efficient authentication scheme for heterogeneous signcryption with cryptographic reverse firewalls for VANETs14
Semi-supervised approach for detecting malicious domains in TLDs in their first query14
Privacy information propagation in online social networks - a case study based on Weibo data14
Certified unlearning for a trustworthy machine learning-based access control administration14
Deceiving supervised machine learning models via adversarial data poisoning attacks: a case study with USB keyboards14
Unmasking SDN flow table saturation: fingerprinting, attacks and defenses14
Business process models and simulation to enable GDPR compliance14
Developers’ mindset on self-adaptive privacy and its requirements for cloud computing environments14
Analyzing shared keys in X.509 certificates with domain ownership13
Generating adversarial examples with collaborative generative models13
Blockchain-based data integrity framework for Internet of Things12
A systematic literature review on wearable health data publishing under differential privacy12
Exploring the potential of deep learning and machine learning techniques for randomness analysis to enhance security on IoT12
Generative AI for pentesting: the good, the bad, the ugly12
Authentication in Internet of Things, protocols, attacks, and open issues: a systematic literature review12
Automated cybersecurity impact propagation across business processes using process mining techniques12
Advancements and challenges in privacy-preserving split learning: experimental findings and future directions12
RLET: a lightweight model for ubiquitous multi-class intrusion detection in sustainable and secured smart environment12
A generic framework for blockchain-assisted on-chain auditing for off-chain storage11
A fog-based anonymous authentication scheme with location privacy for wireless body area network with FPGA implementation11
ANS-based compression and encryption with 128-bit security11
Spatial de-correlation of generated keys from wireless channels using adversarial deep learning11
Cyber-security gamification in federation of cyber ranges: design, implementation, and evaluation11
Multi-cloud applications: data and code fragmentation for improved security11
Security beyond cybersecurity: side-channel attacks against non-cyber systems and their countermeasures11
Toward a unified and secure approach for extraction of forensic digital evidence from an IoT device11
Estimating vulnerability metrics with word embedding and multiclass classification methods11
DevSecOps practices and tools11
Adversarial attacks against mouse- and keyboard-based biometric authentication: black-box versus domain-specific techniques11
Multi-user covert communication in power internet of things networks11
Adversarial attack detection framework based on optimized weighted conditional stepwise adversarial network11
WEFT: a consistent and tamper-proof methodology for acquisition of automatically verifiable forensic web evidence11
Comprehensive review on machine learning and deep learning techniques for malware detection in android and IoT devices10
International journal of information security: a bibliometric study, 2007–202310
Malicious uses of blockchains by malware: from the analysis to Smart-Zephyrus10
Two-stage advanced persistent threat (APT) attack on an IEC 61850 power grid substation9
Abuse-freeness in contract signing: a blockchain-based proposal9
Trust attack prevention based on Spark-blockchain in social IoT: a survey9
A comprehensive analysis of cryptocurrency breaches at endpoint9
A first look at references from the dark to the surface web world: a case study in Tor9
Identifying factors influencing the duration of zero-day vulnerabilities9
Analysis of OSPU security effect and data assembly verification under semi-network OS architecture9
An overview of proposals towards the privacy-preserving publication of trajectory data9
A Data-centric approach for safe and secure large language models against threatening and toxic content9
A comprehensive Blockchain-oriented secure framework for SDN/Fog-based IoUT9
A systematic overview on methods to protect sensitive data provided for various analyses9
Cyber–physical risk assessment for false data injection attacks considering moving target defences9
TENET: a new hybrid network architecture for adversarial defense9
A conflict-aware active BLE state machine learning and state coverage-guided gray-box fuzz testing method8
Protection of centralized SDN control plane from high-rate Packet-In messages8
Challenges of post-quantum digital signing in real-world applications: a survey8
Performance analysis of capsule networks for detecting GPS spoofing attacks on unmanned aerial vehicles8
Factors influencing Swedish citizens’ willingness to provide their mobile phones to forensic examination8
Vulnerability discovery based on source code patch commit mining: a systematic literature review8
Generating ICS vulnerability playbooks with open standards8
A unit-based symbolic execution method for detecting memory corruption vulnerabilities in executable codes8
Non-Alpha-Num: a novel architecture for generating adversarial examples for bypassing NLP-based clickbait detection mechanisms8
Federated learning for misbehaviour detection with variational autoencoders and Gaussian mixture models8
Deep behavioral analysis of machine learning algorithms against data poisoning8
Enhancing DevSecOps practice with Large Language Models and Security Chaos Engineering8
Large language models for software vulnerability detection: a guide for researchers on models, methods, techniques, datasets, and metrics8
Novel mechanism for anonymous reporting and anonymous rewarding using blockchain technology8
Selfish mining attack in blockchain: a systematic literature review8
Anonymous provision of privacy-sensitive services using blockchain and decentralised storage8
Securing the IoT ecosystem: ASIC-based hardware realization of Ascon lightweight cipher8
Retraction Note: Deep learning based network intrusion detection system: a systematic literature review and future scopes8
Email bombing attack detection and mitigation using machine learning8
Correction: Cryptocurrency recovery framework using pre-signed transaction8
Revisiting QUIC attacks: a comprehensive review on QUIC security and a hands-on study8
A computationally efficient dimensionality reduction and attack classification approach for network intrusion detection7
The Agent Web Model: modeling web hacking for reinforcement learning7
Maritime decision-makers and cyber security: deck officers’ perception of cyber risks towards IT and OT systems7
Scalable, password-based and threshold authentication for smart homes7
Balancing the act? Resampling versus imbalanced data for Wi-Fi IDS7
Detecting malicious nodes using game theory and reinforcement learning in software-defined networks7
Pioneering automated vulnerability detection for smart contracts in blockchain using KEVM: Guardian ADRGAN7
A deep learning approach based on multi-view consensus for SQL injection detection7
Efficient and interpretable SRU combined with TabNet for network intrusion detection in the big data environment7
SCAnME - scanner comparative analysis and metrics for evaluation7
Aldp-fl: an adaptive local differential privacy-based federated learning mechanism for IoT6
A comprehensive survey of phishing: mediums, intended targets, attack and defence techniques and a novel taxonomy6
Transformer or Autoencoder? Who is the ultimate adversary for attack detectors?6
From sinking to saving: MITRE ATT &CK and D3FEND frameworks for maritime cybersecurity6
SmartiPhish: a reinforcement learning-based intelligent anti-phishing solution to detect spoofed website attacks6
DFTMicroagg: a dual-level anonymization algorithm for smart grid data6
Federated learning-based intrusion detection system for Internet of Things6
Security analysis and improvement of a privacy-preserving authentication scheme in VANET6
Start thinking in graphs: using graphs to address critical attack paths in a Microsoft cloud tenant6
Short- versus long-term performance of detection models for obfuscated MSOffice-embedded malware6
A personalized learning theory-based cyber-security training exercise6
Investigation of application layer DDoS attacks in legacy and software-defined networks: A comprehensive review6
Mobile botnet detection: a comprehensive survey6
An end-to-end intrusion detection system with IoT dataset using deep learning with unsupervised feature extraction6
0.090678930282593