Journal of Information Security and Applications

Papers
(The H4-Index of Journal of Information Security and Applications is 26. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2022-05-01 to 2026-05-01.)
ArticleCitations
Editorial Board136
Understanding practitioner perspectives on using privacy harm categories for privacy risk assessment107
Bane or Boon: Measuring the effect of evasive malware on system call classifiers58
Lightweight privacy-preserving authenticated key agreements using physically unclonable functions for internet of drones53
Refined statistical attacks against searchable symmetric encryption using non-indexed documents49
The reality of backdoored S-Boxes—An eye opener43
Impossible differential cryptanalysis of FBC-12842
Plaintext recovery and tag guessing attacks on authenticated encryption algorithm COLM41
Editorial Board38
A lightweight intrusion detection system for connected autonomous vehicles based on ECANet and image encoding37
Cybersecurity Digital Twins: Concept, blueprint, and challenges for multi-ownership digital service chains36
Collusion-resistant multi-user searchable symmetric encryption with conjunctive query and suppressed pattern leakage36
Maaker: A framework for detecting and defeating evasion techniques in Android malware36
DRAC: A dynamic fine-grained access control scheme for cloud storage with censorship-coerced resistance34
PGAN framework for synthesizing sensor data privately33
Synergistic compensation for RGB-based blind color image watermarking to withstand JPEG compression29
Incorporating deep learning into capacitive images for smartphone user authentication29
PVO-based reversible data hiding using bit plane segmentation and pixel expansion29
Smart contracts vulnerability detection model based on adversarial multi-task learning28
A 3D robust chaotic speech encryption scheme based on feature hashing and key distribution28
Detection of Evasive Android Malware Using EigenGCN28
A novel 5-bit S-box design for lightweight cryptography algorithms27
Robust zero-watermarking algorithm via multi-scale feature analysis for medical images27
Current approaches and future directions for Cyber Threat Intelligence sharing: A survey26
Robust watermarking based on optimal synchronization signal26
Improving data extraction accuracy for median filter-based data hiding method26
0.049113988876343