4.8(top 5%)
impact factor
1.1K(top 20%)
papers
14.2K(top 20%)
citations
47(top 20%)
h-index
5.0(top 5%)
impact factor
1.4K
all documents
15.4K
doc citations
80(top 10%)
g-index

Top Articles

#TitleJournalYearCitations
1Internet of Things: A survey on the security of IoT frameworksJournal of Information Security and Applications2018546
2Blockchain-based electronic healthcare record system for healthcare 4.0 applicationsJournal of Information Security and Applications2020480
3Deep learning for cyber security intrusion detection: Approaches, datasets, and comparative studyJournal of Information Security and Applications2020421
4Advanced social engineering attacksJournal of Information Security and Applications2015325
5Cyber intrusion detection by combined feature selection algorithmJournal of Information Security and Applications2019192
6Identification of malicious activities in industrial internet of things based on deep learning modelsJournal of Information Security and Applications2018184
7When an attacker meets a cipher-image in 2018: A year in reviewJournal of Information Security and Applications2019133
8An access control model for cloud computingJournal of Information Security and Applications2014131
9STPA-SafeSec: Safety and security analysis for cyber-physical systemsJournal of Information Security and Applications2017123
10A hybrid deep learning image-based analysis for effective malware detectionJournal of Information Security and Applications2019121
11A Deep Learning-based Cryptocurrency Price Prediction Scheme for Financial InstitutionsJournal of Information Security and Applications2020114
12Detection of power grid disturbances and cyber-attacks based on machine learningJournal of Information Security and Applications2019113
13A lightweight biometrics based remote user authentication scheme for IoT servicesJournal of Information Security and Applications2017106
14Colour image encryption algorithm combining Arnold map, DNA sequence operation, and a Mandelbrot setJournal of Information Security and Applications2020104
15An exploratory study of cyber hygiene behaviors and knowledgeJournal of Information Security and Applications201893
16Blockchain based secured information sharing protocol in supply chain management system with key distribution mechanismJournal of Information Security and Applications202088
17A taxonomy for attack graph generation and usage in network securityJournal of Information Security and Applications201677
18Security and privacy of UAV data using blockchain technologyJournal of Information Security and Applications202073
19Enhanced credit card fraud detection based on SVM-recursive feature elimination and hyper-parameters optimizationJournal of Information Security and Applications202073
20Efficient privacy-preserving authentication framework for edge-assisted Internet of DronesJournal of Information Security and Applications201972
21An efficient colour image encryption scheme based on 1-D chaotic mapsJournal of Information Security and Applications201972
22Multiple grayscale image encryption using cross-coupled chaotic mapsJournal of Information Security and Applications202072
23A survey on behavioral biometric authentication on smartphonesJournal of Information Security and Applications201771
24Dissecting pattern unlock: The effect of pattern strength meter on pattern selectionJournal of Information Security and Applications201469
25Computational intelligence intrusion detection techniques in mobile cloud computing environments: Review, taxonomy, and open research issuesJournal of Information Security and Applications202069
26A review of image steganalysis techniques for digital forensicsJournal of Information Security and Applications201868
27A new DCT-based robust image watermarking method using teaching-learning-Based optimizationJournal of Information Security and Applications201968
28A novel honeypot based security approach for real-time intrusion detection and prevention systemsJournal of Information Security and Applications201867
29Image steganography based on Canny edge detection, dilation operator and hybrid codingJournal of Information Security and Applications201867
30An efficient and secure anonymous mobility network authentication schemeJournal of Information Security and Applications201466
31Combining ensemble methods and social network metrics for improving accuracy of OCSVM on intrusion detection in SCADA systemsJournal of Information Security and Applications201666
32A new transform domain steganography based on modified logistic chaotic map for color imagesJournal of Information Security and Applications201766
33An improved certificateless aggregate signature scheme without bilinear pairings for vehicular ad hoc networksJournal of Information Security and Applications201966
34AndroSimilar: Robust signature for detecting variants of Android malwareJournal of Information Security and Applications201561
35A novel pseudo random sequence generator for image-cryptographic applicationsJournal of Information Security and Applications201761
36Ransomware behavioural analysis on windows platformsJournal of Information Security and Applications201860
37Attack classification of an intrusion detection system using deep learning and hyperparameter optimizationJournal of Information Security and Applications202159
38Information security risks management framework – A step towards mitigating security risks in university networkJournal of Information Security and Applications201758
39Motivation and opportunity based model to reduce information security insider threats in organisationsJournal of Information Security and Applications201858
40An Enhanced and Secured RSA Key Generation Scheme (ESRKGS)Journal of Information Security and Applications201557
41A secure image encryption scheme based on cellular automata and chaotic skew tent mapJournal of Information Security and Applications201957
42Bi-GISIS KE: Modified key exchange protocol with reusable keys for IoT securityJournal of Information Security and Applications202155
43Secure mutual authentication and automated access control for IoT smart home using cumulative Keyed-hash chainJournal of Information Security and Applications201954
44Secure multi–level permutation operation based multiple colour image encryptionJournal of Information Security and Applications201853
45Classification of malware families based on runtime behaviorsJournal of Information Security and Applications201752
46Agent architecture of an intelligent medical system based on federated learning and blockchain technologyJournal of Information Security and Applications202152
47A comprehensive approach to discriminate DDoS attacks from flash eventsJournal of Information Security and Applications201651
48Dynamic pricing in industrial internet of things: Blockchain application for energy management in smart citiesJournal of Information Security and Applications202051
49Trust-aware and cooperative routing protocol for IoT securityJournal of Information Security and Applications202051
50Trust-based privacy-aware participant selection in social participatory sensingJournal of Information Security and Applications201550