Journal of Information Security and Applications

Papers
(The H4-Index of Journal of Information Security and Applications is 30. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2020-04-01 to 2024-04-01.)
ArticleCitations
A Deep Learning-based Cryptocurrency Price Prediction Scheme for Financial Institutions115
Blockchain based secured information sharing protocol in supply chain management system with key distribution mechanism83
Computational intelligence intrusion detection techniques in mobile cloud computing environments: Review, taxonomy, and open research issues66
Enhanced credit card fraud detection based on SVM-recursive feature elimination and hyper-parameters optimization63
Security and privacy of UAV data using blockchain technology63
Attack classification of an intrusion detection system using deep learning and hyperparameter optimization59
Multiple grayscale image encryption using cross-coupled chaotic maps58
Dynamic pricing in industrial internet of things: Blockchain application for energy management in smart cities50
A robust authentication and access control protocol for securing wireless healthcare sensor networks49
Cyber security for fog-based smart grid SCADA systems: Solutions and challenges48
Adversarial attacks on machine learning cybersecurity defences in Industrial Control Systems47
A secure blockchain-based e-health records storage and sharing scheme47
Agent architecture of an intelligent medical system based on federated learning and blockchain technology44
Blockchain and quantum blind signature-based hybrid scheme for healthcare 5.0 applications43
Deterministic chaos game: A new fractal based pseudo-random number generator and its cryptographic application41
A TAN based hybrid model for android malware detection40
Multi-view deep learning for zero-day Android malware detection39
Trust-aware and cooperative routing protocol for IoT security39
Weaponized AI for cyber attacks38
Voting extreme learning machine based distributed denial of service attack detection in cloud computing35
Blockchain-empowered cloud architecture based on secret sharing for smart city35
ESEAP: ECC based secure and efficient mutual authentication protocol using smart card34
Survey of false data injection in smart power grid: Attacks, countermeasures and challenges34
Evaluation metric for crypto-ransomware detection using machine learning34
A copy-move image forgery detection technique based on tetrolet transform33
Blockchain-Enabled healthcare system for detection of diabetes32
A robust copy-move forgery detection technique based on discrete cosine transform and cellular automata32
A dependable hybrid machine learning model for network intrusion detection30
Dynamic 3D scrambled image based RGB image encryption scheme using hyperchaotic system and DNA encoding30
A three-factor anonymous user authentication scheme for Internet of Things environments30
0.048332929611206