Journal of Information Security and Applications

Papers
(The median citation count of Journal of Information Security and Applications is 2. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2022-05-01 to 2026-05-01.)
ArticleCitations
Editorial Board136
Understanding practitioner perspectives on using privacy harm categories for privacy risk assessment107
Bane or Boon: Measuring the effect of evasive malware on system call classifiers58
Lightweight privacy-preserving authenticated key agreements using physically unclonable functions for internet of drones53
Refined statistical attacks against searchable symmetric encryption using non-indexed documents49
The reality of backdoored S-Boxes—An eye opener43
Impossible differential cryptanalysis of FBC-12842
Plaintext recovery and tag guessing attacks on authenticated encryption algorithm COLM41
Editorial Board38
A lightweight intrusion detection system for connected autonomous vehicles based on ECANet and image encoding37
Cybersecurity Digital Twins: Concept, blueprint, and challenges for multi-ownership digital service chains36
Collusion-resistant multi-user searchable symmetric encryption with conjunctive query and suppressed pattern leakage36
Maaker: A framework for detecting and defeating evasion techniques in Android malware36
DRAC: A dynamic fine-grained access control scheme for cloud storage with censorship-coerced resistance34
PGAN framework for synthesizing sensor data privately33
Synergistic compensation for RGB-based blind color image watermarking to withstand JPEG compression29
Incorporating deep learning into capacitive images for smartphone user authentication29
PVO-based reversible data hiding using bit plane segmentation and pixel expansion29
A 3D robust chaotic speech encryption scheme based on feature hashing and key distribution28
Detection of Evasive Android Malware Using EigenGCN28
Smart contracts vulnerability detection model based on adversarial multi-task learning28
Robust zero-watermarking algorithm via multi-scale feature analysis for medical images27
A novel 5-bit S-box design for lightweight cryptography algorithms27
Robust watermarking based on optimal synchronization signal26
Improving data extraction accuracy for median filter-based data hiding method26
Current approaches and future directions for Cyber Threat Intelligence sharing: A survey26
Merkle multi-branch hash tree-based dynamic data integrity auditing for B5G network cloud storage25
Security concerns for Large Language Models: A survey25
A deep learning assisted personalized deception system for countering web application attacks24
SDT-CNN-based network security situation awareness24
Statistical privacy protection for secure data access control in cloud24
Vulnerabilities in Machine Learning for cybersecurity: Current trends and future research directions24
A one-time-pad-like chaotic image encryption scheme using data steganography23
A new anonymous authentication framework for secure smart grids applications22
Puncturable-based broadcast encryption with tracking for preventing malicious encryptors in cloud file sharing22
An adaptable deep learning-based intrusion detection system to zero-day attacks21
Exposing the darkness within: A review of dark personality traits, models, and measures and their relationship to insider threats21
Deep GraphSAGE enhancements for intrusion detection: Analyzing attention mechanisms and GCN integration21
A different base approach for better efficiency on range proofs21
Blockchain-based access control model for smart grids using peak hour and privilege level attributes (BACS-HP)21
NeuroIDBench: An open-source benchmark framework for the standardization of methodology in brainwave-based authentication research21
Generalized implicit-key attacks on RSA20
A perspective trend of hyperelliptic curve cryptosystem for lighted weighted environments20
Editorial Board19
An information-theoretically secure quantum multiparty private set intersection19
A traceable threshold Asmuth–Bloom secret sharing scheme19
A provably secure collusion-resistant identity-based proxy re-encryption scheme based on NTRU19
Verifiable cross-modal searchable encryption via hierarchical spherical tree with beam search19
HALO: Heterogeneous evaluation of arithmetic-and-logic circuit via unified homomorphic instruction set18
A scalable and semi-supervised approach for Ethereum fraud detection using Graph Neural Networks and K-Nearest Neighbors clustering18
VeriKNN: A verifiable and efficient secure k-NN query scheme via homomorphic encryption in dual-cloud environments18
Adversarial feature generation for ML-based intrusion detection in the petrochemical industry18
GuardFS: A file system for integrated detection and mitigation of Linux-based ransomware18
Editorial Board18
A statistical verification method of random permutations for hiding countermeasure against side-channel attacks18
PARGMF: A provenance-enabled automated rule generation and matching framework with multi-level attack description model18
High payload H.266/Versatile Video Coding (VVC) steganography based on affine motion estimation and chaotic maps18
FRAPE: A Framework for Risk Assessment, Prioritization and Explainability of vulnerabilities in cybersecurity17
Moiré pattern generation-based image steganography17
A novel blockchain-based anonymous roaming authentication scheme for VANET17
Fed-HA: A Privacy-Preserving Robust Federated Learning Scheme based on Homomorphic Assessment17
A hybrid BTP approach with filtered BCH codes for improved performance and security16
Differential privacy performance evaluation under the condition of non-uniform noise distribution16
Personal information: Perceptions, types and evolution16
Enabling anonymized open-data linkage by authorized parties16
Multi-mediated semi-quantum key distribution protocol with cyclic topology16
Subject Data Auditing via Source Inference Attack in Cross-Silo Federated Learning16
Nash mixed detection strategy of multi-type network attack based on zero-sum stochastic game16
LR-CAKA: A leakage-resilient compatible authenticated key agreement protocol for heterogeneous public-key cryptosystems16
Real-time Automotive Ethernet Intrusion Detection Using Sliding Window-Based Temporal Convolutional Residual Attention Networks15
Reversible data hiding in encrypted images using adaptive block-level pixel difference encoding15
A tenant-aware deep learning-based intrusion detection system for detecting DDoS attacks in multi-tenant SaaS networks15
FP-growth-based signature extraction and unknown variants of DoS/DDoS attack detection on real-time data stream15
Host-based intrusion detection with multi-datasource and deep learning15
A lattice-based group signature with backward unlinkability for medical blockchain systems15
SoK: Systematic analysis of adversarial threats against deep learning approaches for autonomous anomaly detection systems in SDN-IoT networks15
Dynamic-anonymous privacy-preserving authenticated aggregation for safety-warning system for the Internet of Vehicles15
On the feasibility of E2E verifiable online voting – A case study from Durga Puja trial15
Disposable identities: Solving web tracking14
A hybrid-trust-based emergency message dissemination model for vehicular ad hoc networks14
A distributed privacy-preserving data aggregation scheme for smart grid with fine-grained access control14
A high-accuracy phishing website detection method based on machine learning14
AUKA: Asynchronous updatable key agreement for edge-based mobile crowd sensing14
Through the static: Demystifying malware visualization via explainability14
Corrigendum to “On cryptographic mechanisms for the selective disclosure of verifiable credentials” [Journal of Information Security and Applications, 83, 2024,103789]14
A designated tester-based certificateless public key encryption with conjunctive keyword search for cloud-based MIoT in dynamic multi-user environment14
Zerovision: A privacy-preserving iris authentication framework using zero knowledge proofs and steganographic safeguards14
You are what the permissions told me! Android malware detection based on hybrid tactics14
SecTwin: A secure and efficient authentication mechanism for vehicular digital twins14
An anonymous verifiable random function with unbiasability and constant size proof14
4D chaotic system-based secure data hiding method to improve robustness and embedding capacity of videos13
A quantum resistant multi-user signcryption scheme featuring key invisibility for Internet of Things13
A secure and efficient face template protection scheme based on chaos13
SoK: The design paradigm of safe and secure defaults13
Secure sparse watermarking on DWT-SVD for digital images13
A dependable hybrid machine learning model for network intrusion detection13
A novel scheme to encrypting autonomous driving scene point clouds based on optical chaos13
Intervalmapping and QR code based multi-stage reversible watermarking scheme for vector map distribution and source tracing13
Certificate-based authenticated encryption with keyword search: Enhanced security model and a concrete construction for Internet of Things13
Hierarchical Threshold Multi-Key Fully Homomorphic Encryption13
Real-time monitoring model of DDoS attacks using distance thresholds in Edge cooperation networks13
Reversible data hiding in encrypted image using two-pass pixel value ordering12
BridgeSec: Facilitating effective communication between security engineering and systems engineering12
Fed-LSAE: Thwarting poisoning attacks against federated cyber threat detection system via Autoencoder-based latent space inspection12
Blockchain-based threshold proxy re-encryption scheme with zero-knowledge proofs for confidential and verifiable IoT networks12
A privacy protection scheme for biological characteristics based on 4D hyperchaos and matrix transformation12
Enhancing privacy-preserving machine learning with self-learnable activation functions in fully homomorphic encryption12
Software supply chain: A taxonomy of attacks, mitigations and risk assessment strategies12
AB-FGSM: AdaBelief optimizer and FGSM-based approach to generate adversarial examples12
Corrigendum to “An extended Attribute-based access control with controlled delegation in IoT” [Journal of Information Systems and Applications 76 (2023) 103473]12
Detection of identity swapping attacks in low-resolution image settings12
Hiding speech in music files12
Block-based image encryption inspired by NTRU using self-invertible matrices12
Adversarial watermark: A robust and reliable watermark against removal11
Scan-free verifiable public-key searchable encryption supporting efficient user updates in distributed systems11
TIM: Secure and usable authentication for smartphones11
Editorial Board11
Realization of multi-image encryption algorithm based on DNA and chaotic system on FPGA11
Lightweight certificate revocation for low-power IoT with end-to-end security11
Local Search Trajectories over S-box space11
WiCapose: Multi-modal fusion based transparent authentication in mobile environments11
A consumer-centered security framework for sharing health data in social networks11
Improved neural distinguishers with multi-round and multi-splicing construction11
On the modeling of cyber-attacks associated with social engineering: A parental control prototype11
Image-based malware representation approach with EfficientNet convolutional neural networks for effective malware classification11
An efficient cheating-detectable secret image sharing scheme with smaller share sizes11
LSPR23: A novel IDS dataset from the largest live-fire cybersecurity exercise10
Classification of random number generator applications in IoT: A comprehensive taxonomy10
A group key agreement protocol based on ECDH and short signature10
A comprehensive survey of automated Advanced Persistent Threat attribution: Taxonomy, methods, challenges and open research problems10
Vertin: Fast, Communication-friendly and Key-compact secure inference system for NNs and LLMs10
Addressing insider attacks via forensic-ready risk management10
A secure and effective image encryption scheme by combining parallel compressed sensing with secret sharing scheme10
Secure multi-factor access control mechanism for pairing blockchains10
Homomorphic additive lightweight block cipher scheme for securing IoT applications10
Detection of intranet scanning traffic and tool detection based on multi-feature fusion10
Performance analysis of a parameterized minutiae-based approach for securing fingerprint templates in biometric authentication systems10
Privacy-preserving and verifiable multi-task data aggregation for IoT-based healthcare10
Efficient verifiable secure aggregation protocols for federated learning10
A novel approach for malicious URL detection using RoBERTa and sparse autoencoder10
Multi-party anonymous authentication scheme in heterogeneous network slicing10
A feature vector-based modeling attack method on symmetrical obfuscated interconnection PUF10
Lattice-based puncturable blind signature scheme: Enhancing privacy and security in large language models10
FRIDA: Free-rider detection using privacy attacks10
A general framework for high-dimension data secure aggregation with resilience to dropouts10
Isogeny computation on Kummer lines and applications9
A lightweight hierarchical key management approach for internet of things9
A security model to protect the isolation of medical data in the cloud using hybrid cryptography9
Explainable android malware detection and malicious code localization using graph attention9
A multi-label network attack detection approach based on two-stage model fusion9
Fractional salp swarm algorithm: An association rule based privacy-preserving strategy for data sanitization9
Semi-supervised QIM steganalysis with ladder networks9
PSDCLS: Parallel simultaneous diffusion–confusion image cryptosystem based on Latin square9
Statistical image watermark decoder using NSM-HMT in NSCT-FGPCET magnitude domain9
Secure outsourced decryption for FHE-based privacy-preserving cloud computing9
From the detection towards a pyramidal classification of terrorist propaganda9
Non-additive image steganographic framework based on variational inference in Markov Random Fields9
A Pairing-free Dynamic Multi-receiver Certificateless Authenticated Searchable Encryption for cloud storage9
A generic cryptographic algorithm identification scheme based on ciphertext features9
Color image encryption algorithm based on hybrid chaos and layered strategies9
Robust image hashing based on multi-view dimension reduction9
RETRACTED: Designing energy-aware collaborative intrusion detection in IoT networks8
Quantum-resilient blockchain framework for privacy-preserving genomic data sharing and analysis8
Practical collusion-resistant conjunctive dynamic searchable encryption with result pattern hiding8
VHNet: A Video Hiding Network with robustness to video coding8
Visualization-based comprehensive feature representation with improved EfficientNet for malicious file and variant recognition8
SVScanner: Detecting smart contract vulnerabilities via deep semantic extraction8
Role mining under User-Distribution cardinality constraint8
A tradeoff paradigm shift in cryptographically-secure pseudorandom number generation based on discrete logarithm8
A privacy-preserving cross-media retrieval on encrypted data in cloud computing8
Modeling and physical attack resistant authentication protocol with double PUFs8
Secure information processing for multimedia forensics using zero-trust security model for large scale data analytics in SaaS cloud computing environment8
Security analysis of a novel image encryption algorithm based on 3D chaos8
Cryptographic primitives based on compact knapsack problem8
A cross-architecture malware detection approach based on intermediate representation8
Verifiable quaternion fully homomorphic encryption scheme for mitigating false data injection attacks by privacy preservation in fog environment8
A time-efficient and noise-resistant cryptosystem based on discrete wavelet transform and chaos theory: An application in image encryption8
Say the image: Auditory masking effect-driven invertible network for progressive image-in-audio steganography8
A Novel Privacy-Preserving user information queries scheme with functional policy8
Deepfakes in digital media forensics: Generation, AI-based detection and challenges8
Reversible data hiding in PDF files by overlapping characters8
Large language model (LLM) for software security: Code analysis, malware analysis, reverse engineering8
A screen-shooting resilient data-hiding algorithm based on two-level singular value decomposition8
Editorial Board8
Editorial Board8
Privacy-preserving model for biometric-based authentication and Key Derivation Function7
An improved privacy attack on smartphones exploiting the accelerometer7
Anti-pruning multi-watermarking for ownership proof of steganographic autoencoders7
Victimization in DDoS attacks: The role of popularity and industry sector7
Formal verification of a V2X scheme mixing traditional PKI and group signatures7
Improved biometric data protection: Bounded brute-force strategy for maximum likelihood decoding7
IDHG-ECC-integrated Diffie Hellman Galois–elliptic-curve cryptography for enhancing EHR data security7
LWR-based Quantum-Safe Pseudo-Random Number Generator7
Forensic analysis of web browsers lifecycle: A case study7
An efficient and practical approach for privacy-preserving Naive Bayes classification7
Compression-robust detection of Motion-Compensated Frame Interpolation using Discrete Cosine Transform in logarithm domain7
Fed-Adapt: A Federated Learning Framework for Adaptive Topology Reconfiguration Against Multi-Rate DDoS and Database Flooding Attacks7
A privacy-preserving information sharing scheme in online social networks7
Uncertainty-aware regular-singular discriminant analysis for lossless watermarking7
Bargaining game theoretical analysis framework for ransomware attacks7
VMC2-PS: Bloc7
ppLeader: Achieving the Privacy-Preserving Leaders in PoS Protocols7
Insights into security and privacy issues in smart healthcare systems based on medical images7
Digital image steganalysis using entropy driven deep neural network7
Corrigendum to ‘A novel sophisticated hybrid method for intrusion detection using the artificial immune system’7
Multi-ciphertext equality test heterogeneous signcryption scheme based on location privacy7
A novel privacy-preserving multi-level aggregate signcryption and query scheme for Smart Grid via mobile fog computing7
A novel link fabrication attack detection method for low-latency SDN networks7
FedDNA: Behavioural based approach for byzantine defense in federated learning via model fingerprinting and adaptive thresholding7
A detector for Android repackaged applications with layout-fingerprint7
QMDS:QKD-based multi-index data secure sharing solution on blockchain7
Robust clustering federated learning with trusted anchor clients7
A semi-centralized key agreement protocol integrated multiple security communication techniques for LLM-based autonomous driving system7
Multi-datasource machine learning in intrusion detection: Packet flows, system logs and host statistics7
Post-quantum identity-based traitor tracing7
Editorial Board6
A Deep Learning Ensemble Approach to Detecting Unknown Network Attacks6
Mobile applications identification using autoencoder based electromagnetic side channel analysis6
Implementation of face recognition system using BioCryptosystem as template protection scheme6
Improved mixture differential attacks on 6-round AES-like ciphers towards time and data complexities6
Editorial Board6
CyberROAD: A cybersecurity risk assessment ontology for automotive domain aligned with ISO/SAE 21434:20216
Exploiting LSB Self-quantization for Plaintext-related Image Encryption in the Zero-trust Cloud6
GRAMSSAT: An efficient label inference attack against two-party split learning based on gradient matching and semi-supervised learning6
Security analysis of the Classic McEliece, HQC and BIKE schemes in low memory6
ZeroMT: Towards Multi-Transfer transactions with privacy for account-based blockchain6
Neurosymbolic AI for network intrusion detection systems: A survey6
A heterogeneous signcryption scheme with Cryptographic Reverse Firewalls for IoT and its application6
Security implications of user non-compliance behavior to software updates: A risk assessment study6
DroidTTP: Mapping android applications with TTP for Cyber Threat Intelligence6
RPCP-PURI: A robust and precise computational predictor for Phishing Uniform Resource Identification6
Efficient identity-based traceable cloud data broadcasting with outsider anonymity and simultaneous individual transmission6
A study on implementing the BLAS interface in the MPC context6
Optimization of Access Control Policies6
A class-imbalance-aware intrusion detection system based on spatiotemporal graph neural networks for software-defined vehicles6
Safe-LBP: A visually meaningful image encryption scheme based on LBP and compressive sensing6
Simple and efficient threshold changeable secret sharing6
Efficient quantum algorithms to break group ring cryptosystems6
HAKECC: Highly efficient authentication and key agreement scheme based on ECDH for RFID in IOT environment6
A constant round quantum secure protocol for oblivious polynomial evaluation6
DAG blockchain-based lightweight authentication and authorization scheme for IoT devices6
GwPFV: A novel packet forwarding verification mechanism based on gateways in SDN-based storage environment6
High-throughput block cipher implementations with SIMD6
Enhancing robustness in video data hiding against recompression with a wide parameter range6
Enabling privacy-preserving medication analysis in distributed EHR systems6
Implementing and evaluating a GDPR-compliant open-source SIEM solution6
RL-IDS: A robust and lightweight intrusion detection system for in-vehicle network6
Protecting metadata privacy in blockchain-based EHR systems: A group addressing structure6
Generalization of multicast encryption for Internet of Things deployment6
Enabling security risk assessment and management for business process models6
0.16649007797241