Journal of Information Security and Applications

Papers
(The TQCC of Journal of Information Security and Applications is 6. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2021-08-01 to 2025-08-01.)
ArticleCitations
Editorial Board103
Distinguishing and key recovery attacks on the reduced-round SNOW-V and SNOW-Vi48
Detection of Evasive Android Malware Using EigenGCN47
A deep learning assisted personalized deception system for countering web application attacks47
Refined statistical attacks against searchable symmetric encryption using non-indexed documents46
Dynamic secure multi-keyword ranked search over encrypted cloud data41
A novel 5-bit S-box design for lightweight cryptography algorithms39
Merkle multi-branch hash tree-based dynamic data integrity auditing for B5G network cloud storage36
Robust zero-watermarking algorithm via multi-scale feature analysis for medical images31
Editorial Board30
Bane or Boon: Measuring the effect of evasive malware on system call classifiers30
SBRAC: Blockchain-based sealed-bid auction with bidding price privacy and public verifiability29
A lightweight intrusion detection system for connected autonomous vehicles based on ECANet and image encoding29
Incorporating deep learning into capacitive images for smartphone user authentication29
Image data security using Quasigroup combined with Fibonacci Q-transformation28
PGAN framework for synthesizing sensor data privately28
Plaintext recovery and tag guessing attacks on authenticated encryption algorithm COLM27
Maaker: A framework for detecting and defeating evasion techniques in Android malware26
The reality of backdoored S-Boxes—An eye opener26
Lightweight privacy-preserving authenticated key agreements using physically unclonable functions for internet of drones26
Smart contracts vulnerability detection model based on adversarial multi-task learning25
Impossible differential cryptanalysis of FBC-12825
A novel key and image concealing with static-dynamic pattern using modified periodic table24
PVO-based reversible data hiding using bit plane segmentation and pixel expansion24
Current approaches and future directions for Cyber Threat Intelligence sharing: A survey24
Statistical privacy protection for secure data access control in cloud24
Synergistic compensation for RGB-based blind color image watermarking to withstand JPEG compression24
Implementation and evaluation of a privacy-preserving distributed ABC scheme based on multi-signatures24
Editorial Board22
Editorial Board22
Lightweight capability-token for consent-based authentication protocol for smart sensor nodes22
A new anonymous authentication framework for secure smart grids applications22
A novel model for voice command fingerprinting using deep learning22
Towards a robust and trustworthy machine learning system development: An engineering perspective22
Puncturable-based broadcast encryption with tracking for preventing malicious encryptors in cloud file sharing21
Generalized implicit-key attacks on RSA21
An information-theoretically secure quantum multiparty private set intersection20
A different base approach for better efficiency on range proofs19
PARGMF: A provenance-enabled automated rule generation and matching framework with multi-level attack description model19
Securing emergent behaviour in swarm robotics18
Novel Hybrid Model for Intrusion Prediction on Cyber Physical Systems’ Communication Networks based on Bio-inspired Deep Neural Network Structure18
Assessing cyber threats for storyless systems18
Guidelines for GDPR compliance in Big Data systems18
Deep GraphSAGE enhancements for intrusion detection: Analyzing attention mechanisms and GCN integration18
A novel blockchain-based anonymous roaming authentication scheme for VANET18
NeuroIDBench: An open-source benchmark framework for the standardization of methodology in brainwave-based authentication research17
A one-time-pad-like chaotic image encryption scheme using data steganography17
Exposing the darkness within: A review of dark personality traits, models, and measures and their relationship to insider threats17
PUF enable lightweight key-exchange and mutual authentication protocol for multi-server based D2D communication17
A provably secure collusion-resistant identity-based proxy re-encryption scheme based on NTRU17
FRAPE: A Framework for Risk Assessment, Prioritization and Explainability of vulnerabilities in cybersecurity17
A statistical verification method of random permutations for hiding countermeasure against side-channel attacks17
Fast3DS: A real-time full-convolutional malicious domain name detection system17
Multicast DIS attack mitigation in RPL-based IoT-LLNs17
A (k, n) secret document sharing with meaningful shares17
Moiré pattern generation-based image steganography16
A perspective trend of hyperelliptic curve cryptosystem for lighted weighted environments16
Personal information: Perceptions, types and evolution16
You are what the permissions told me! Android malware detection based on hybrid tactics16
On the feasibility of E2E verifiable online voting – A case study from Durga Puja trial16
Through the static: Demystifying malware visualization via explainability16
Secure server-aided attribute-based signature with perfect anonymity for cloud-assisted systems16
Subject Data Auditing via Source Inference Attack in Cross-Silo Federated Learning16
A hybrid BTP approach with filtered BCH codes for improved performance and security16
Permission-based Android malware analysis by using dimension reduction with PCA and LDA16
An adaptable deep learning-based intrusion detection system to zero-day attacks16
Dynamic-anonymous privacy-preserving authenticated aggregation for safety-warning system for the Internet of Vehicles16
Host-based intrusion detection with multi-datasource and deep learning15
Enabling anonymized open-data linkage by authorized parties15
A high-accuracy phishing website detection method based on machine learning15
Differential privacy performance evaluation under the condition of non-uniform noise distribution15
Nash mixed detection strategy of multi-type network attack based on zero-sum stochastic game15
A consumer-centered security framework for sharing health data in social networks14
A hybrid-trust-based emergency message dissemination model for vehicular ad hoc networks14
Exact greedy algorithm based split finding approach for intrusion detection in fog-enabled IoT environment14
Corrigendum to “An extended Attribute-based access control with controlled delegation in IoT” [Journal of Information Systems and Applications 76 (2023) 103473]14
StealthPDF: Data hiding method for PDF file with no visual degradation14
An improved convolution Merkle tree-based blockchain electronic medical record secure storage scheme14
FP-growth-based signature extraction and unknown variants of DoS/DDoS attack detection on real-time data stream14
An anonymous verifiable random function with unbiasability and constant size proof14
Editorial Board14
A distributed privacy-preserving data aggregation scheme for smart grid with fine-grained access control14
A designated tester-based certificateless public key encryption with conjunctive keyword search for cloud-based MIoT in dynamic multi-user environment14
Reversible data hiding in encrypted image using two-pass pixel value ordering13
Anonymous and lightweight secure authentication protocol for mobile Agent system13
An efficient cheating-detectable secret image sharing scheme with smaller share sizes13
Editorial Board13
A quantum resistant multi-user signcryption scheme featuring key invisibility for Internet of Things13
Fed-LSAE: Thwarting poisoning attacks against federated cyber threat detection system via Autoencoder-based latent space inspection13
Identity-based outsider anonymous cloud data outsourcing with simultaneous individual transmission for IoT environment13
4D chaotic system-based secure data hiding method to improve robustness and embedding capacity of videos13
Disposable identities: Solving web tracking13
Certificate-based authenticated encryption with keyword search: Enhanced security model and a concrete construction for Internet of Things13
Improved neural distinguishers with multi-round and multi-splicing construction13
SoK: The design paradigm of safe and secure defaults13
Lightweight certificate revocation for low-power IoT with end-to-end security13
Enhancing privacy-preserving machine learning with self-learnable activation functions in fully homomorphic encryption12
BridgeSec: Facilitating effective communication between security engineering and systems engineering12
Secure sparse watermarking on DWT-SVD for digital images12
Image-based malware representation approach with EfficientNet convolutional neural networks for effective malware classification12
Automated enumeration of block cipher differentials: An optimized branch-and-bound GPU framework12
Hierarchical Threshold Multi-Key Fully Homomorphic Encryption12
Hiding speech in music files12
Adversarial watermark: A robust and reliable watermark against removal12
Function-level obfuscation detection method based on Graph Convolutional Networks12
Real-time monitoring model of DDoS attacks using distance thresholds in Edge cooperation networks12
Detection of identity swapping attacks in low-resolution image settings12
AB-FGSM: AdaBelief optimizer and FGSM-based approach to generate adversarial examples12
A dependable hybrid machine learning model for network intrusion detection12
Multi-party anonymous authentication scheme in heterogeneous network slicing11
Lic-Sec: An enhanced AppArmor Docker security profile generator11
Addressing insider attacks via forensic-ready risk management11
Scan-free verifiable public-key searchable encryption supporting efficient user updates in distributed systems11
Detection of intranet scanning traffic and tool detection based on multi-feature fusion11
Privacy-preserving and verifiable multi-task data aggregation for IoT-based healthcare11
A secure and effective image encryption scheme by combining parallel compressed sensing with secret sharing scheme11
TIM: Secure and usable authentication for smartphones11
Local Search Trajectories over S-box space11
Performance analysis of a parameterized minutiae-based approach for securing fingerprint templates in biometric authentication systems11
Locally optimum image watermark detector based on statistical modeling of SWT-EFMs magnitudes11
Color image encryption algorithm based on hybrid chaos and layered strategies11
I-CIFA: An improved collusive interest flooding attack in named data networking11
WiCapose: Multi-modal fusion based transparent authentication in mobile environments11
HTTP request pattern based signatures for early application layer DDoS detection: A firewall agnostic approach11
Classification of random number generator applications in IoT: A comprehensive taxonomy10
LSPR23: A novel IDS dataset from the largest live-fire cybersecurity exercise10
On the modeling of cyber-attacks associated with social engineering: A parental control prototype10
Deepfakes in digital media forensics: Generation, AI-based detection and challenges10
An intrusion tolerant identity provider with user attributes confidentiality10
Secure outsourced decryption for FHE-based privacy-preserving cloud computing10
Secure multi-factor access control mechanism for pairing blockchains10
Neural networks based domain name generation10
Attacks on cryptosystems implemented via VLSI: A review10
Statistical image watermark decoder using NSM-HMT in NSCT-FGPCET magnitude domain10
Homomorphic additive lightweight block cipher scheme for securing IoT applications10
A comprehensive survey of automated Advanced Persistent Threat attribution: Taxonomy, methods, challenges and open research problems10
A group key agreement protocol based on ECDH and short signature10
Vertin: Fast, Communication-friendly and Key-compact secure inference system for NNs and LLMs10
Blockchain-based decentralized architecture for cloud storage system10
Visualization-based comprehensive feature representation with improved EfficientNet for malicious file and variant recognition10
A novel method to generate key-dependent s-boxes with identical algebraic properties9
Semi-supervised QIM steganalysis with ladder networks9
Fractional salp swarm algorithm: An association rule based privacy-preserving strategy for data sanitization9
Modeling and physical attack resistant authentication protocol with double PUFs9
PSDCLS: Parallel simultaneous diffusion–confusion image cryptosystem based on Latin square9
A privacy-preserving cross-media retrieval on encrypted data in cloud computing9
Isogeny computation on Kummer lines and applications9
A Pairing-free Dynamic Multi-receiver Certificateless Authenticated Searchable Encryption for cloud storage9
Non-additive image steganographic framework based on variational inference in Markov Random Fields9
Robust image hashing based on multi-view dimension reduction9
A security model to protect the isolation of medical data in the cloud using hybrid cryptography9
A generic cryptographic algorithm identification scheme based on ciphertext features9
From the detection towards a pyramidal classification of terrorist propaganda9
A lightweight hierarchical key management approach for internet of things9
Secure information processing for multimedia forensics using zero-trust security model for large scale data analytics in SaaS cloud computing environment9
A multi-label network attack detection approach based on two-stage model fusion9
Cyberprotection in IoT environments: A dynamic rule-based solution to defend smart devices9
Designing energy-aware collaborative intrusion detection in IoT networks9
VHNet: A Video Hiding Network with robustness to video coding9
Practical dynamic group signature with efficient concurrent joins and batch verifications8
A novel privacy-preserving multi-level aggregate signcryption and query scheme for Smart Grid via mobile fog computing8
Adversarial attacks by attaching noise markers on the face against deep face recognition8
Insights into security and privacy issues in smart healthcare systems based on medical images8
SVScanner: Detecting smart contract vulnerabilities via deep semantic extraction8
EO-PSI-CA: Efficient outsourced private set intersection cardinality8
Editorial Board8
A detector for Android repackaged applications with layout-fingerprint8
Role mining under User-Distribution cardinality constraint8
A screen-shooting resilient data-hiding algorithm based on two-level singular value decomposition8
Editorial Board8
A multiclass hybrid approach to estimating software vulnerability vectors and severity score8
IDHG-ECC-integrated Diffie Hellman Galois–elliptic-curve cryptography for enhancing EHR data security8
Verifiable quaternion fully homomorphic encryption scheme for mitigating false data injection attacks by privacy preservation in fog environment8
Anti-pruning multi-watermarking for ownership proof of steganographic autoencoders8
A time-efficient and noise-resistant cryptosystem based on discrete wavelet transform and chaos theory: An application in image encryption8
QMDS:QKD-based multi-index data secure sharing solution on blockchain8
Privacy-preserving model for biometric-based authentication and Key Derivation Function8
Formal verification of a V2X scheme mixing traditional PKI and group signatures8
A semi-centralized key agreement protocol integrated multiple security communication techniques for LLM-based autonomous driving system8
Cryptographic primitives based on compact knapsack problem8
A novel link fabrication attack detection method for low-latency SDN networks8
Implementation of face recognition system using BioCryptosystem as template protection scheme7
An efficient and practical approach for privacy-preserving Naive Bayes classification7
Generalization of multicast encryption for Internet of Things deployment7
Security analysis of the Classic McEliece, HQC and BIKE schemes in low memory7
Multi-datasource machine learning in intrusion detection: Packet flows, system logs and host statistics7
DAG blockchain-based lightweight authentication and authorization scheme for IoT devices7
A lightweight certificateless authentication scheme and group key agreement with dynamic updating mechanism for LTE-V-based internet of vehicles in smart cities7
An improved privacy attack on smartphones exploiting the accelerometer7
Corrigendum to ‘A novel sophisticated hybrid method for intrusion detection using the artificial immune system’7
Post-quantum identity-based traitor tracing7
A tradeoff paradigm shift in cryptographically-secure pseudorandom number generation based on discrete logarithm7
Improved mixture differential attacks on 6-round AES-like ciphers towards time and data complexities7
Mobile applications identification using autoencoder based electromagnetic side channel analysis7
Simple and efficient threshold changeable secret sharing7
Keeping classical distinguisher and neural distinguisher in balance7
CovertSYS: A systematic covert communication approach for providing secure end-to-end conversation via social networks7
Compression-robust detection of Motion-Compensated Frame Interpolation using Discrete Cosine Transform in logarithm domain7
VSTNet: Robust watermarking scheme based on voxel space transformation for diffusion tensor imaging images7
High-throughput block cipher implementations with SIMD7
Quaternion with quantum walks for designing a novel color image cryptosystem7
RiderAuth: A cancelable touch-signature based rider authentication scheme for driverless taxis7
Forensic analysis of web browsers lifecycle: A case study7
A Deep Learning Ensemble Approach to Detecting Unknown Network Attacks7
Crook-sourced intrusion detection as a service7
GwPFV: A novel packet forwarding verification mechanism based on gateways in SDN-based storage environment7
Improved Sine-Tangent chaotic map with application in medical images encryption7
Enhancing android malware detection explainability through function call graph APIs7
RPCP-PURI: A robust and precise computational predictor for Phishing Uniform Resource Identification7
Digital image steganalysis using entropy driven deep neural network7
Dual adversarial attacks: Fooling humans and classifiers7
A new lattice-based authentication scheme for IoT7
Efficient identity-based traceable cloud data broadcasting with outsider anonymity and simultaneous individual transmission7
LWR-based Quantum-Safe Pseudo-Random Number Generator7
Multi-ciphertext equality test heterogeneous signcryption scheme based on location privacy7
Secure word-level sorting based on fully homomorphic encryption6
Stegano-Purge: An integer wavelet transformation based adaptive universal image sterilizer for steganography removal6
Improved (related-key) differential cryptanalysis on 6
Guaranteeing anonymity in attribute-based authorization6
ZeroMT: Towards Multi-Transfer transactions with privacy for account-based blockchain6
Corrigendum to Fast hybrid-MixNet for security and privacy using NTRU algorithm: [Journal of Information Security and Applications, Volume 60, August 2021, Start page–End page/102872]6
Implementing and evaluating a GDPR-compliant open-source SIEM solution6
Log pseudonymization: Privacy maintenance in practice6
Editorial Board6
Spatio-temporal representation learning enhanced source cell-phone recognition from speech recordings6
Enabling security risk assessment and management for business process models6
A portable hardware security module and cryptographic key generator6
Attention based multi-agent intrusion detection systems using reinforcement learning6
RON-enhanced blockchain propagation mechanism for edge-enabled smart cities6
Editorial Board6
An effective iris biometric privacy protection scheme with renewability6
SGX-Stream: A Secure Stream Analytics Framework In SGX-enabled Edge Cloud6
Reversible data hiding scheme based on improved interpolation and three-in-one intelligent strategy6
GENDA: A Graph Embedded Network Based Detection Approach on encryption algorithm of binary program6
CyberROAD: A cybersecurity risk assessment ontology for automotive domain aligned with ISO/SAE 21434:20216
Efficient quantum algorithms to break group ring cryptosystems6
Safe-LBP: A visually meaningful image encryption scheme based on LBP and compressive sensing6
A Model-Free Approach to Intrusion Response Systems6
An explainable deepfake of speech detection method with spectrograms and waveforms6
FUPE: A security driven task scheduling approach for SDN-based IoT–Fog networks6
Analysis and enhancement of secure three-factor user authentication using Chebyshev Chaotic Map6
A sanitizable signcryption scheme with public verifiability via chameleon hash function6
A constant round quantum secure protocol for oblivious polynomial evaluation6
Using language-specific input methods and pronunciation rules to improve the guesses of passwords6
HAKECC: Highly efficient authentication and key agreement scheme based on ECDH for RFID in IOT environment6
Enabling privacy-preserving medication analysis in distributed EHR systems6
Exploiting LSB Self-quantization for Plaintext-related Image Encryption in the Zero-trust Cloud6
Optimization of Access Control Policies6
A generic framework for decomposing block cipher structure with secret components6
Beyond known threats: A novel strategy for isolating and detecting unknown malicious traffic6
0.066586017608643