Journal of Information Security and Applications

Papers
(The TQCC of Journal of Information Security and Applications is 6. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2021-09-01 to 2025-09-01.)
ArticleCitations
Editorial Board105
Distinguishing and key recovery attacks on the reduced-round SNOW-V and SNOW-Vi53
A deep learning assisted personalized deception system for countering web application attacks49
Refined statistical attacks against searchable symmetric encryption using non-indexed documents48
Editorial Board47
A lightweight intrusion detection system for connected autonomous vehicles based on ECANet and image encoding42
SBRAC: Blockchain-based sealed-bid auction with bidding price privacy and public verifiability39
Dynamic secure multi-keyword ranked search over encrypted cloud data36
Synergistic compensation for RGB-based blind color image watermarking to withstand JPEG compression34
Incorporating deep learning into capacitive images for smartphone user authentication33
Image data security using Quasigroup combined with Fibonacci Q-transformation32
Plaintext recovery and tag guessing attacks on authenticated encryption algorithm COLM31
The reality of backdoored S-Boxes—An eye opener30
Maaker: A framework for detecting and defeating evasion techniques in Android malware29
Lightweight privacy-preserving authenticated key agreements using physically unclonable functions for internet of drones29
Smart contracts vulnerability detection model based on adversarial multi-task learning28
Statistical privacy protection for secure data access control in cloud27
Implementation and evaluation of a privacy-preserving distributed ABC scheme based on multi-signatures27
PVO-based reversible data hiding using bit plane segmentation and pixel expansion26
Robust zero-watermarking algorithm via multi-scale feature analysis for medical images26
Merkle multi-branch hash tree-based dynamic data integrity auditing for B5G network cloud storage26
DRAC: A dynamic fine-grained access control scheme for cloud storage with censorship-coerced resistance25
A novel 5-bit S-box design for lightweight cryptography algorithms25
Current approaches and future directions for Cyber Threat Intelligence sharing: A survey25
Detection of Evasive Android Malware Using EigenGCN25
Understanding practitioner perspectives on using privacy harm categories for privacy risk assessment24
PGAN framework for synthesizing sensor data privately24
Robust watermarking based on optimal synchronization signal22
Bane or Boon: Measuring the effect of evasive malware on system call classifiers22
Impossible differential cryptanalysis of FBC-12822
Improving data extraction accuracy for median filter-based data hiding method22
A novel key and image concealing with static-dynamic pattern using modified periodic table22
Lightweight capability-token for consent-based authentication protocol for smart sensor nodes21
Editorial Board21
Editorial Board21
Generalized implicit-key attacks on RSA20
A novel model for voice command fingerprinting using deep learning20
Puncturable-based broadcast encryption with tracking for preventing malicious encryptors in cloud file sharing20
An information-theoretically secure quantum multiparty private set intersection19
PARGMF: A provenance-enabled automated rule generation and matching framework with multi-level attack description model19
Deep GraphSAGE enhancements for intrusion detection: Analyzing attention mechanisms and GCN integration18
A different base approach for better efficiency on range proofs18
Securing emergent behaviour in swarm robotics18
Assessing cyber threats for storyless systems18
Novel Hybrid Model for Intrusion Prediction on Cyber Physical Systems’ Communication Networks based on Bio-inspired Deep Neural Network Structure17
A provably secure collusion-resistant identity-based proxy re-encryption scheme based on NTRU17
SDT-CNN-based network security situation awareness17
A new anonymous authentication framework for secure smart grids applications17
NeuroIDBench: An open-source benchmark framework for the standardization of methodology in brainwave-based authentication research17
A novel blockchain-based anonymous roaming authentication scheme for VANET17
Exposing the darkness within: A review of dark personality traits, models, and measures and their relationship to insider threats17
A statistical verification method of random permutations for hiding countermeasure against side-channel attacks17
GuardFS: A file system for integrated detection and mitigation of Linux-based ransomware17
Guidelines for GDPR compliance in Big Data systems17
Multicast DIS attack mitigation in RPL-based IoT-LLNs16
PUF enable lightweight key-exchange and mutual authentication protocol for multi-server based D2D communication16
Fast3DS: A real-time full-convolutional malicious domain name detection system16
Moiré pattern generation-based image steganography16
A perspective trend of hyperelliptic curve cryptosystem for lighted weighted environments16
A (k, n) secret document sharing with meaningful shares16
A one-time-pad-like chaotic image encryption scheme using data steganography16
An adaptable deep learning-based intrusion detection system to zero-day attacks16
FRAPE: A Framework for Risk Assessment, Prioritization and Explainability of vulnerabilities in cybersecurity16
Towards a robust and trustworthy machine learning system development: An engineering perspective16
A hybrid BTP approach with filtered BCH codes for improved performance and security16
Permission-based Android malware analysis by using dimension reduction with PCA and LDA16
Through the static: Demystifying malware visualization via explainability15
Enabling anonymized open-data linkage by authorized parties15
Host-based intrusion detection with multi-datasource and deep learning15
On the feasibility of E2E verifiable online voting – A case study from Durga Puja trial15
Differential privacy performance evaluation under the condition of non-uniform noise distribution15
Subject Data Auditing via Source Inference Attack in Cross-Silo Federated Learning15
Dynamic-anonymous privacy-preserving authenticated aggregation for safety-warning system for the Internet of Vehicles15
A distributed privacy-preserving data aggregation scheme for smart grid with fine-grained access control14
FP-growth-based signature extraction and unknown variants of DoS/DDoS attack detection on real-time data stream14
Personal information: Perceptions, types and evolution14
Nash mixed detection strategy of multi-type network attack based on zero-sum stochastic game14
A hybrid-trust-based emergency message dissemination model for vehicular ad hoc networks14
Secure server-aided attribute-based signature with perfect anonymity for cloud-assisted systems14
An improved convolution Merkle tree-based blockchain electronic medical record secure storage scheme14
A designated tester-based certificateless public key encryption with conjunctive keyword search for cloud-based MIoT in dynamic multi-user environment14
Fed-HA: A Privacy-Preserving Robust Federated Learning Scheme based on Homomorphic Assessment14
Editorial Board13
Reversible data hiding in encrypted image using two-pass pixel value ordering13
A high-accuracy phishing website detection method based on machine learning13
An anonymous verifiable random function with unbiasability and constant size proof13
A consumer-centered security framework for sharing health data in social networks13
Editorial Board13
You are what the permissions told me! Android malware detection based on hybrid tactics13
StealthPDF: Data hiding method for PDF file with no visual degradation13
Enhancing privacy-preserving machine learning with self-learnable activation functions in fully homomorphic encryption13
Corrigendum to “An extended Attribute-based access control with controlled delegation in IoT” [Journal of Information Systems and Applications 76 (2023) 103473]13
Disposable identities: Solving web tracking12
BridgeSec: Facilitating effective communication between security engineering and systems engineering12
Real-time monitoring model of DDoS attacks using distance thresholds in Edge cooperation networks12
SoK: The design paradigm of safe and secure defaults12
Fed-LSAE: Thwarting poisoning attacks against federated cyber threat detection system via Autoencoder-based latent space inspection12
Function-level obfuscation detection method based on Graph Convolutional Networks12
Hierarchical Threshold Multi-Key Fully Homomorphic Encryption12
Detection of identity swapping attacks in low-resolution image settings12
A quantum resistant multi-user signcryption scheme featuring key invisibility for Internet of Things12
Anonymous and lightweight secure authentication protocol for mobile Agent system12
AB-FGSM: AdaBelief optimizer and FGSM-based approach to generate adversarial examples12
Hiding speech in music files12
An efficient cheating-detectable secret image sharing scheme with smaller share sizes12
Certificate-based authenticated encryption with keyword search: Enhanced security model and a concrete construction for Internet of Things12
Improved neural distinguishers with multi-round and multi-splicing construction12
A novel scheme to encrypting autonomous driving scene point clouds based on optical chaos11
Image-based malware representation approach with EfficientNet convolutional neural networks for effective malware classification11
A secure and effective image encryption scheme by combining parallel compressed sensing with secret sharing scheme11
Efficient verifiable secure aggregation protocols for federated learning11
4D chaotic system-based secure data hiding method to improve robustness and embedding capacity of videos11
Adversarial watermark: A robust and reliable watermark against removal11
Automated enumeration of block cipher differentials: An optimized branch-and-bound GPU framework11
LSPR23: A novel IDS dataset from the largest live-fire cybersecurity exercise11
A feature vector-based modeling attack method on symmetrical obfuscated interconnection PUF11
Lightweight certificate revocation for low-power IoT with end-to-end security11
A secure and efficient face template protection scheme based on chaos11
A dependable hybrid machine learning model for network intrusion detection11
Multi-party anonymous authentication scheme in heterogeneous network slicing11
Neural networks based domain name generation11
Locally optimum image watermark detector based on statistical modeling of SWT-EFMs magnitudes11
Secure sparse watermarking on DWT-SVD for digital images11
TIM: Secure and usable authentication for smartphones10
Scan-free verifiable public-key searchable encryption supporting efficient user updates in distributed systems10
HTTP request pattern based signatures for early application layer DDoS detection: A firewall agnostic approach10
Secure outsourced decryption for FHE-based privacy-preserving cloud computing10
Addressing insider attacks via forensic-ready risk management10
Lattice-based puncturable blind signature scheme: Enhancing privacy and security in large language models10
Performance analysis of a parameterized minutiae-based approach for securing fingerprint templates in biometric authentication systems10
Vertin: Fast, Communication-friendly and Key-compact secure inference system for NNs and LLMs10
Blockchain-based decentralized architecture for cloud storage system10
On the modeling of cyber-attacks associated with social engineering: A parental control prototype10
I-CIFA: An improved collusive interest flooding attack in named data networking10
WiCapose: Multi-modal fusion based transparent authentication in mobile environments10
Local Search Trajectories over S-box space10
Detection of intranet scanning traffic and tool detection based on multi-feature fusion10
A comprehensive survey of automated Advanced Persistent Threat attribution: Taxonomy, methods, challenges and open research problems10
Privacy-preserving and verifiable multi-task data aggregation for IoT-based healthcare9
Lic-Sec: An enhanced AppArmor Docker security profile generator9
Homomorphic additive lightweight block cipher scheme for securing IoT applications9
From the detection towards a pyramidal classification of terrorist propaganda9
Visualization-based comprehensive feature representation with improved EfficientNet for malicious file and variant recognition9
Classification of random number generator applications in IoT: A comprehensive taxonomy9
A group key agreement protocol based on ECDH and short signature9
An intrusion tolerant identity provider with user attributes confidentiality9
A generic cryptographic algorithm identification scheme based on ciphertext features9
Secure multi-factor access control mechanism for pairing blockchains9
Color image encryption algorithm based on hybrid chaos and layered strategies9
Statistical image watermark decoder using NSM-HMT in NSCT-FGPCET magnitude domain9
Fractional salp swarm algorithm: An association rule based privacy-preserving strategy for data sanitization9
A novel method to generate key-dependent s-boxes with identical algebraic properties9
A Pairing-free Dynamic Multi-receiver Certificateless Authenticated Searchable Encryption for cloud storage8
Modeling and physical attack resistant authentication protocol with double PUFs8
A lightweight hierarchical key management approach for internet of things8
Non-additive image steganographic framework based on variational inference in Markov Random Fields8
A security model to protect the isolation of medical data in the cloud using hybrid cryptography8
Cryptographic primitives based on compact knapsack problem8
Editorial Board8
Deepfakes in digital media forensics: Generation, AI-based detection and challenges8
Semi-supervised QIM steganalysis with ladder networks8
A privacy-preserving cross-media retrieval on encrypted data in cloud computing8
PSDCLS: Parallel simultaneous diffusion–confusion image cryptosystem based on Latin square8
VHNet: A Video Hiding Network with robustness to video coding8
Designing energy-aware collaborative intrusion detection in IoT networks8
A detector for Android repackaged applications with layout-fingerprint8
A novel link fabrication attack detection method for low-latency SDN networks8
A multi-label network attack detection approach based on two-stage model fusion8
Secure information processing for multimedia forensics using zero-trust security model for large scale data analytics in SaaS cloud computing environment8
Isogeny computation on Kummer lines and applications8
Robust image hashing based on multi-view dimension reduction8
Anti-pruning multi-watermarking for ownership proof of steganographic autoencoders8
Editorial Board8
Formal verification of a V2X scheme mixing traditional PKI and group signatures8
Verifiable quaternion fully homomorphic encryption scheme for mitigating false data injection attacks by privacy preservation in fog environment8
Digital image steganalysis using entropy driven deep neural network7
A new lattice-based authentication scheme for IoT7
EO-PSI-CA: Efficient outsourced private set intersection cardinality7
Efficient identity-based traceable cloud data broadcasting with outsider anonymity and simultaneous individual transmission7
VMC2-PS: Bloc7
QMDS:QKD-based multi-index data secure sharing solution on blockchain7
A cross-architecture malware detection approach based on intermediate representation7
Role mining under User-Distribution cardinality constraint7
Privacy-preserving model for biometric-based authentication and Key Derivation Function7
Multi-datasource machine learning in intrusion detection: Packet flows, system logs and host statistics7
Enhancing android malware detection explainability through function call graph APIs7
Compression-robust detection of Motion-Compensated Frame Interpolation using Discrete Cosine Transform in logarithm domain7
Improved mixture differential attacks on 6-round AES-like ciphers towards time and data complexities7
A tradeoff paradigm shift in cryptographically-secure pseudorandom number generation based on discrete logarithm7
Corrigendum to ‘A novel sophisticated hybrid method for intrusion detection using the artificial immune system’7
A lightweight certificateless authentication scheme and group key agreement with dynamic updating mechanism for LTE-V-based internet of vehicles in smart cities7
Insights into security and privacy issues in smart healthcare systems based on medical images7
Quaternion with quantum walks for designing a novel color image cryptosystem7
Practical dynamic group signature with efficient concurrent joins and batch verifications7
A screen-shooting resilient data-hiding algorithm based on two-level singular value decomposition7
IDHG-ECC-integrated Diffie Hellman Galois–elliptic-curve cryptography for enhancing EHR data security7
A multiclass hybrid approach to estimating software vulnerability vectors and severity score7
SVScanner: Detecting smart contract vulnerabilities via deep semantic extraction7
RPCP-PURI: A robust and precise computational predictor for Phishing Uniform Resource Identification7
RiderAuth: A cancelable touch-signature based rider authentication scheme for driverless taxis7
Forensic analysis of web browsers lifecycle: A case study7
An improved privacy attack on smartphones exploiting the accelerometer7
LWR-based Quantum-Safe Pseudo-Random Number Generator7
Multi-ciphertext equality test heterogeneous signcryption scheme based on location privacy7
Improved biometric data protection: Bounded brute-force strategy for maximum likelihood decoding7
Post-quantum identity-based traitor tracing7
Bargaining game theoretical analysis framework for ransomware attacks7
A novel privacy-preserving multi-level aggregate signcryption and query scheme for Smart Grid via mobile fog computing7
A semi-centralized key agreement protocol integrated multiple security communication techniques for LLM-based autonomous driving system7
A time-efficient and noise-resistant cryptosystem based on discrete wavelet transform and chaos theory: An application in image encryption7
ppLeader: Achieving the Privacy-Preserving Leaders in PoS Protocols7
DAG blockchain-based lightweight authentication and authorization scheme for IoT devices7
A Deep Learning Ensemble Approach to Detecting Unknown Network Attacks7
Editorial Board6
HAKECC: Highly efficient authentication and key agreement scheme based on ECDH for RFID in IOT environment6
Security analysis of the Classic McEliece, HQC and BIKE schemes in low memory6
Log pseudonymization: Privacy maintenance in practice6
Generalization of multicast encryption for Internet of Things deployment6
Implementation of face recognition system using BioCryptosystem as template protection scheme6
Security implications of user non-compliance behavior to software updates: A risk assessment study6
Keeping classical distinguisher and neural distinguisher in balance6
Enabling privacy-preserving medication analysis in distributed EHR systems6
Optimization of Access Control Policies6
A study on implementing the BLAS interface in the MPC context6
A heterogeneous signcryption scheme with Cryptographic Reverse Firewalls for IoT and its application6
A constant round quantum secure protocol for oblivious polynomial evaluation6
Mobile applications identification using autoencoder based electromagnetic side channel analysis6
Spatio-temporal representation learning enhanced source cell-phone recognition from speech recordings6
CovertSYS: A systematic covert communication approach for providing secure end-to-end conversation via social networks6
An efficient and practical approach for privacy-preserving Naive Bayes classification6
Dual adversarial attacks: Fooling humans and classifiers6
VSTNet: Robust watermarking scheme based on voxel space transformation for diffusion tensor imaging images6
Exploiting LSB Self-quantization for Plaintext-related Image Encryption in the Zero-trust Cloud6
A Model-Free Approach to Intrusion Response Systems6
SGX-Stream: A Secure Stream Analytics Framework In SGX-enabled Edge Cloud6
CyberROAD: A cybersecurity risk assessment ontology for automotive domain aligned with ISO/SAE 21434:20216
Enabling security risk assessment and management for business process models6
Efficient quantum algorithms to break group ring cryptosystems6
ZeroMT: Towards Multi-Transfer transactions with privacy for account-based blockchain6
Crook-sourced intrusion detection as a service6
GENDA: A Graph Embedded Network Based Detection Approach on encryption algorithm of binary program6
Simple and efficient threshold changeable secret sharing6
High-throughput block cipher implementations with SIMD6
Improved Sine-Tangent chaotic map with application in medical images encryption6
Editorial Board6
PB-3PAKA: Password-based three-party authenticated key agreement protocol for mobile devices in post-quantum environments6
DroidTTP: Mapping android applications with TTP for Cyber Threat Intelligence6
GRAMSSAT: An efficient label inference attack against two-party split learning based on gradient matching and semi-supervised learning6
Enhancing robustness in video data hiding against recompression with a wide parameter range6
Safe-LBP: A visually meaningful image encryption scheme based on LBP and compressive sensing6
0.10440516471863