International Journal of Information Security

Papers
(The TQCC of International Journal of Information Security is 5. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2021-04-01 to 2025-04-01.)
ArticleCitations
pbins: private bins for top-k semantic search over encrypted data using transformers103
A unit-based symbolic execution method for detecting memory corruption vulnerabilities in executable codes74
Analysis of OSPU security effect and data assembly verification under semi-network OS architecture66
Non-Alpha-Num: a novel architecture for generating adversarial examples for bypassing NLP-based clickbait detection mechanisms43
Information security and privacy challenges of cloud computing for government adoption: a systematic review42
Protection of centralized SDN control plane from high-rate Packet-In messages35
Enhancing privacy protections in national identification systems: an examination of stakeholders’ knowledge, attitudes, and practices of privacy by design34
Activity-based payments: alternative (anonymous) online payment model27
Neighbor discovery protocol anomaly-based detection system using neural network algorithm26
AutoPKI: public key infrastructure for IoT with automated trust transfer23
A voting gray wolf optimizer-based ensemble learning models for intrusion detection in the Internet of Things22
Adaptive context-aware access control for IoT environments leveraging fog computing22
A comprehensive Blockchain-oriented secure framework for SDN/Fog-based IoUT22
Generating ICS vulnerability playbooks with open standards22
Exploring smooth number-based MAC algorithms for secure communication in IoT devices: a systematic literature review21
Efficient arabic and english social spam detection using a transformer and 2D convolutional neural network-based deep learning filter20
Inflect-text: a novel mechanism to evade neural text classifiers by leveraging word inflectional perturbations19
A location-updating based self-healing group key management scheme for VANETs18
Using machine learning to detect network intrusions in industrial control systems: a survey18
A systematic review of graphical password methods resistant to shoulder-surfing attacks17
Low-impact, near real-time risk assessment for legacy IT infrastructures17
Novel mechanism for anonymous reporting and anonymous rewarding using blockchain technology17
BitCracker: BitLocker meets GPUs17
Information-theoretic privacy-preserving user authentication17
A multi-objective cost–benefit optimization algorithm for network hardening16
Anomalous behavior detection-based approach for authenticating smart home system users15
A survey on analyzing encrypted network traffic of mobile devices15
TENET: a new hybrid network architecture for adversarial defense15
Flexible adversary disclosure risk measure for identity and attribute disclosure attacks15
Highly private blockchain-based management system for digital COVID-19 certificates14
Blockchain-based multi-diagnosis deep learning application for various diseases classification13
Lib2Desc: automatic generation of security-centric Android app descriptions using third-party libraries13
An integrated deep learning model for Ethereum smart contract vulnerability detection13
The rise of “security and privacy”: bibliometric analysis of computer privacy research13
Revisiting QUIC attacks: a comprehensive review on QUIC security and a hands-on study13
A TCP-based covert channel with integrity check and retransmission12
Integrating AI-driven threat intelligence and forecasting in the cyber security exercise content generation lifecycle12
Expediting the design and development of secure cloud-based mobile apps12
Selfish mining attack in blockchain: a systematic literature review12
Challenges and future research directions in secure multi-party computation for resource-constrained devices and large-scale computations12
SFCGDroid: android malware detection based on sensitive function call graph12
Enhancing security in QCA-based circuits using optimal key gate placement12
Challenges of post-quantum digital signing in real-world applications: a survey11
The SAINT observatory subsystem: an open-source intelligence tool for uncovering cybersecurity threats11
Browser-in-the-Middle (BitM) attack11
cFEM: a cluster based feature extraction method for network intrusion detection11
An overview of proposals towards the privacy-preserving publication of trajectory data11
An SSH predictive model using machine learning with web proxy session logs11
Abuse-freeness in contract signing: a blockchain-based proposal10
SealFSv2: combining storage-based and ratcheting for tamper-evident logging10
Pepal: Penalizing multimedia breaches and partial leakages10
How education level influences internet security knowledge, behaviour, and attitude: a comparison among undergraduates, postgraduates and working graduates10
Feature engineering impact on position falsification attacks detection in vehicular ad-hoc network9
Information flow control for comparative privacy analyses9
Enhancing security in Fiat–Shamir transformation-based non-interactive zero-knowledge protocols for IoT authentication9
An intrusion detection approach based on incremental long short-term memory9
Systematic review of SIEM technology: SIEM-SC birth9
A comprehensive analysis on software vulnerability detection datasets: trends, challenges, and road ahead9
A content-based deep intrusion detection system9
A novel two-level secure access control approach for blockchain platform in healthcare9
RAMA: a risk assessment solution for healthcare organizations9
AiCEF: an AI-assisted cyber exercise content generation framework using named entity recognition9
Fast but approximate homomorphic k-means based on masking technique9
C2-Eye: framework for detecting command and control (C2) connection of supply chain attacks9
De Bello Homomorphico: Investigation of the extensibility of the OpenFHE library with basic mathematical functions by means of common approaches using the example of the CKKS cryptosystem9
Trends in publishing blockchain surveys: a bibliometric perspective8
XAIRF-WFP: a novel XAI-based random forest classifier for advanced email spam detection8
Cyber risk management for autonomous passenger ships using threat-informed defense-in-depth8
Software vulnerability detection under poisoning attacks using CNN-based image processing8
A review on fake news detection 3T’s: typology, time of detection, taxonomies8
Cyber–physical risk assessment for false data injection attacks considering moving target defences8
A modular cyber security training programme for the maritime domain8
Cryptocurrency recovery framework using pre-signed transaction8
Applying NLP techniques to malware detection in a practical environment8
Speeding-up fuzzing through directional seeds8
Intelligent and behavioral-based detection of malware in IoT spectrum sensors8
Trust modeling in a distributed collaborative environment: application to a collaborative healthcare system8
Applications of cyber insurance in smart cities: a systematic literature review8
Outlier-oriented poisoning attack: a grey-box approach to disturb decision boundaries by perturbing outliers in multiclass learning8
Privacy-preserving continuous authentication using behavioral biometrics8
Intrusion detection system over real-time data traffic using machine learning methods with feature selection approaches7
An enhanced and verifiable lightweight authentication protocol for securing the Internet of Medical Things (IoMT) based on CP-ABE encryption7
A study of machine learning-based models for detection, control, and mitigation of cyberbullying in online social media7
Fairness as a Service (FaaS): verifiable and privacy-preserving fairness auditing of machine learning systems7
Enhancing detection of malicious profiles and spam tweets with an automated honeypot framework powered by deep learning7
Vulnerability discovery based on source code patch commit mining: a systematic literature review7
Enhancing network security through integration of game theory in software-defined networking framework7
Malware classification approaches utilizing binary and text encoding of permissions7
Securing the IoT ecosystem: ASIC-based hardware realization of Ascon lightweight cipher7
Evading malware classifiers using RL agent with action-mask7
Perceptions of organizational responsibility for cybersecurity in Saudi Arabia: a moderated mediation analysis7
BA-flag: a self-prevention mechanism of selfish mining attacks in blockchain technology6
Dynamic authentication for intelligent sensor clouds in the Internet of Things6
A method for insider threat assessment by modeling the internal employee interactions6
Gaming the system: tetromino-based covert channel and its impact on mobile security6
Publisher Correction: PPAM-mIoMT: a privacy-preserving authentication with device verification for securing healthcare systems in 5G networks6
Multi-party codebook distribution strategy based on secret sharing6
Maritime cybersecurity: protecting digital seas6
BASPED: Blockchain assisted searchable public key encryption over outsourced data6
Optimization of parallel firewalls filtering rules6
Email bombing attack detection and mitigation using machine learning6
Cyber threat assessment and management for securing healthcare ecosystems using natural language processing6
Pioneering automated vulnerability detection for smart contracts in blockchain using KEVM: Guardian ADRGAN6
RWArmor: a static-informed dynamic analysis approach for early detection of cryptographic windows ransomware6
A hybrid IDS for detection and mitigation of sinkhole attack in 6LoWPAN networks5
Random resampling algorithms for addressing the imbalanced dataset classes in insider threat detection5
A novel approach for detection of APT malware using multi-dimensional hybrid Bayesian belief network5
On the adoption and deployment of secure and privacy-preserving IIoT in smart manufacturing: a comprehensive guide with recent advances5
PSO + FL = PAASO: particle swarm optimization + federated learning = privacy-aware agent swarm optimization5
Deep behavioral analysis of machine learning algorithms against data poisoning5
Balancing the act? Resampling versus imbalanced data for Wi-Fi IDS5
Cyber range design framework for cyber security education and training5
Network intrusion detection and mitigation in SDN using deep learning models5
BAPRP: a machine learning approach to blackhole attacks prevention routing protocol in vehicular Ad Hoc networks5
An exploratory study on domain knowledge infusion in deep learning for automated threat defense5
Retraction Note: Deep learning based network intrusion detection system: a systematic literature review and future scopes5
Correction: Cryptocurrency recovery framework using pre-signed transaction5
Side-channel attacks and countermeasures for heart rate retrieval from ECG characterization device5
Locating collaborative attack targets based on physical invariants toward cyber-physical systems5
Evaluating the merits and constraints of cryptography-steganography fusion: a systematic analysis5
Performance analysis of capsule networks for detecting GPS spoofing attacks on unmanned aerial vehicles5
A comprehensive approach for mitigating impersonation in online assessment: integrity policy and random authentication5
Validation and extension of two domain-specific information privacy competency models5
Securesdp: a novel software-defined perimeter implementation for enhanced network security and scalability5
From frontlines to online: examining target preferences in the Russia–Ukraine conflict5
Press play, install malware: a study of rhythm game-based malware dropping5
0.12796902656555