About
Technology
Issues
FAQ
Search
Scientometrics
Impact Factor
Discipline Ranks
h
-index
g
-index
Articles
Citations
Article Citations
Citation Distribution
Overviews
Top Institutions
Top Schools
Top Authors
Prolific Authors
Top Articles
Citing Bodies
Top Citing Authors
Top Citing Institutions
Top Citing Schools
Top Citing Journals
Top Citing Disciplines
exaly
›
Journals
›
Journal of Information Security and Applications
›
top-articles
Journal of Information Security and Applications
4.8
(top 5%)
impact factor
1.1K
(top 20%)
papers
14.2K
(top 20%)
citations
47
(top 20%)
h
-index
5.0
(top 5%)
impact factor
1.4K
all documents
15.4K
doc citations
80
(top 10%)
g
-index
Top Articles
#
Title
Journal
Year
Citations
1
Internet of Things: A survey on the security of IoT frameworks
Journal of Information Security and Applications
2018
546
2
Blockchain-based electronic healthcare record system for healthcare 4.0 applications
Journal of Information Security and Applications
2020
480
3
Deep learning for cyber security intrusion detection: Approaches, datasets, and comparative study
Journal of Information Security and Applications
2020
421
4
Advanced social engineering attacks
Journal of Information Security and Applications
2015
325
5
Cyber intrusion detection by combined feature selection algorithm
Journal of Information Security and Applications
2019
192
6
Identification of malicious activities in industrial internet of things based on deep learning models
Journal of Information Security and Applications
2018
184
7
When an attacker meets a cipher-image in 2018: A year in review
Journal of Information Security and Applications
2019
133
8
An access control model for cloud computing
Journal of Information Security and Applications
2014
131
9
STPA-SafeSec: Safety and security analysis for cyber-physical systems
Journal of Information Security and Applications
2017
123
10
A hybrid deep learning image-based analysis for effective malware detection
Journal of Information Security and Applications
2019
121
11
A Deep Learning-based Cryptocurrency Price Prediction Scheme for Financial Institutions
Journal of Information Security and Applications
2020
114
12
Detection of power grid disturbances and cyber-attacks based on machine learning
Journal of Information Security and Applications
2019
113
13
A lightweight biometrics based remote user authentication scheme for IoT services
Journal of Information Security and Applications
2017
106
14
Colour image encryption algorithm combining Arnold map, DNA sequence operation, and a Mandelbrot set
Journal of Information Security and Applications
2020
104
15
An exploratory study of cyber hygiene behaviors and knowledge
Journal of Information Security and Applications
2018
93
16
Blockchain based secured information sharing protocol in supply chain management system with key distribution mechanism
Journal of Information Security and Applications
2020
88
17
A taxonomy for attack graph generation and usage in network security
Journal of Information Security and Applications
2016
77
18
Security and privacy of UAV data using blockchain technology
Journal of Information Security and Applications
2020
73
19
Enhanced credit card fraud detection based on SVM-recursive feature elimination and hyper-parameters optimization
Journal of Information Security and Applications
2020
73
20
Efficient privacy-preserving authentication framework for edge-assisted Internet of Drones
Journal of Information Security and Applications
2019
72
21
An efficient colour image encryption scheme based on 1-D chaotic maps
Journal of Information Security and Applications
2019
72
22
Multiple grayscale image encryption using cross-coupled chaotic maps
Journal of Information Security and Applications
2020
72
23
A survey on behavioral biometric authentication on smartphones
Journal of Information Security and Applications
2017
71
24
Dissecting pattern unlock: The effect of pattern strength meter on pattern selection
Journal of Information Security and Applications
2014
69
25
Computational intelligence intrusion detection techniques in mobile cloud computing environments: Review, taxonomy, and open research issues
Journal of Information Security and Applications
2020
69
26
A review of image steganalysis techniques for digital forensics
Journal of Information Security and Applications
2018
68
27
A new DCT-based robust image watermarking method using teaching-learning-Based optimization
Journal of Information Security and Applications
2019
68
28
A novel honeypot based security approach for real-time intrusion detection and prevention systems
Journal of Information Security and Applications
2018
67
29
Image steganography based on Canny edge detection, dilation operator and hybrid coding
Journal of Information Security and Applications
2018
67
30
An efficient and secure anonymous mobility network authentication scheme
Journal of Information Security and Applications
2014
66
31
Combining ensemble methods and social network metrics for improving accuracy of OCSVM on intrusion detection in SCADA systems
Journal of Information Security and Applications
2016
66
32
A new transform domain steganography based on modified logistic chaotic map for color images
Journal of Information Security and Applications
2017
66
33
An improved certificateless aggregate signature scheme without bilinear pairings for vehicular ad hoc networks
Journal of Information Security and Applications
2019
66
34
AndroSimilar: Robust signature for detecting variants of Android malware
Journal of Information Security and Applications
2015
61
35
A novel pseudo random sequence generator for image-cryptographic applications
Journal of Information Security and Applications
2017
61
36
Ransomware behavioural analysis on windows platforms
Journal of Information Security and Applications
2018
60
37
Attack classification of an intrusion detection system using deep learning and hyperparameter optimization
Journal of Information Security and Applications
2021
59
38
Information security risks management framework – A step towards mitigating security risks in university network
Journal of Information Security and Applications
2017
58
39
Motivation and opportunity based model to reduce information security insider threats in organisations
Journal of Information Security and Applications
2018
58
40
An Enhanced and Secured RSA Key Generation Scheme (ESRKGS)
Journal of Information Security and Applications
2015
57
41
A secure image encryption scheme based on cellular automata and chaotic skew tent map
Journal of Information Security and Applications
2019
57
42
Bi-GISIS KE: Modified key exchange protocol with reusable keys for IoT security
Journal of Information Security and Applications
2021
55
43
Secure mutual authentication and automated access control for IoT smart home using cumulative Keyed-hash chain
Journal of Information Security and Applications
2019
54
44
Secure multi–level permutation operation based multiple colour image encryption
Journal of Information Security and Applications
2018
53
45
Classification of malware families based on runtime behaviors
Journal of Information Security and Applications
2017
52
46
Agent architecture of an intelligent medical system based on federated learning and blockchain technology
Journal of Information Security and Applications
2021
52
47
A comprehensive approach to discriminate DDoS attacks from flash events
Journal of Information Security and Applications
2016
51
48
Dynamic pricing in industrial internet of things: Blockchain application for energy management in smart cities
Journal of Information Security and Applications
2020
51
49
Trust-aware and cooperative routing protocol for IoT security
Journal of Information Security and Applications
2020
51
50
Trust-based privacy-aware participant selection in social participatory sensing
Journal of Information Security and Applications
2015
50
site/software ©
exaly
; All materials licenced under
CC by-SA
.