Journal of Information Security and Applications

Papers
(The H4-Index of Journal of Information Security and Applications is 24. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2021-08-01 to 2025-08-01.)
ArticleCitations
Editorial Board103
Distinguishing and key recovery attacks on the reduced-round SNOW-V and SNOW-Vi48
A deep learning assisted personalized deception system for countering web application attacks47
Detection of Evasive Android Malware Using EigenGCN47
Refined statistical attacks against searchable symmetric encryption using non-indexed documents46
Dynamic secure multi-keyword ranked search over encrypted cloud data41
A novel 5-bit S-box design for lightweight cryptography algorithms39
Merkle multi-branch hash tree-based dynamic data integrity auditing for B5G network cloud storage36
Robust zero-watermarking algorithm via multi-scale feature analysis for medical images31
Editorial Board30
Bane or Boon: Measuring the effect of evasive malware on system call classifiers30
Incorporating deep learning into capacitive images for smartphone user authentication29
SBRAC: Blockchain-based sealed-bid auction with bidding price privacy and public verifiability29
A lightweight intrusion detection system for connected autonomous vehicles based on ECANet and image encoding29
Image data security using Quasigroup combined with Fibonacci Q-transformation28
PGAN framework for synthesizing sensor data privately28
Plaintext recovery and tag guessing attacks on authenticated encryption algorithm COLM27
Lightweight privacy-preserving authenticated key agreements using physically unclonable functions for internet of drones26
Maaker: A framework for detecting and defeating evasion techniques in Android malware26
The reality of backdoored S-Boxes—An eye opener26
Smart contracts vulnerability detection model based on adversarial multi-task learning25
Impossible differential cryptanalysis of FBC-12825
Synergistic compensation for RGB-based blind color image watermarking to withstand JPEG compression24
Implementation and evaluation of a privacy-preserving distributed ABC scheme based on multi-signatures24
A novel key and image concealing with static-dynamic pattern using modified periodic table24
PVO-based reversible data hiding using bit plane segmentation and pixel expansion24
Current approaches and future directions for Cyber Threat Intelligence sharing: A survey24
Statistical privacy protection for secure data access control in cloud24
0.10808706283569