Journal of Information Security and Applications

Title Publication Date Language Citations
Blockchain-based electronic healthcare record system for healthcare 4.0 applications2020/02/01English244
Internet of Things: A survey on the security of IoT frameworks2018/02/01English241
Deep learning for cyber security intrusion detection: Approaches, datasets, and comparative study2020/02/01English220
Advanced social engineering attacks2015/06/01English127
Identification of malicious activities in industrial internet of things based on deep learning models2018/08/01English89
When an attacker meets a cipher-image in 2018: A year in review2019/10/01English87
Cyber intrusion detection by combined feature selection algorithm2019/02/01English83
A hybrid deep learning image-based analysis for effective malware detection2019/08/01English67
Blockchain based secured information sharing protocol in supply chain management system with key distribution mechanism2020/10/01English64
Detection of power grid disturbances and cyber-attacks based on machine learning2019/06/01English59
Colour image encryption algorithm combining Arnold map, DNA sequence operation, and a Mandelbrot set2020/02/01English59
A Deep Learning-based Cryptocurrency Price Prediction Scheme for Financial Institutions2020/12/01English56
Multiple grayscale image encryption using cross-coupled chaotic maps2020/06/01English55
Efficient privacy-preserving authentication framework for edge-assisted Internet of Drones2019/10/01English55
An exploratory study of cyber hygiene behaviors and knowledge2018/10/01English54
STPA-SafeSec: Safety and security analysis for cyber-physical systems2017/06/01English48
An improved certificateless aggregate signature scheme without bilinear pairings for vehicular ad hoc networks2019/02/01English48
A lightweight biometrics based remote user authentication scheme for IoT services2017/06/01English45
A robust authentication and access control protocol for securing wireless healthcare sensor networks2020/06/01English42
Computational intelligence intrusion detection techniques in mobile cloud computing environments: Review, taxonomy, and open research issues2020/12/01English42
An access control model for cloud computing2014/02/01English40
Enhanced credit card fraud detection based on SVM-recursive feature elimination and hyper-parameters optimization2020/12/01English39
Deterministic chaos game: A new fractal based pseudo-random number generator and its cryptographic application2020/06/01English39
Security and privacy of UAV data using blockchain technology2020/12/01English38
An efficient colour image encryption scheme based on 1-D chaotic maps2019/06/01English38
Implementation and practical problems of chaos-based cryptography revisited2020/02/01English36
Dynamic pricing in industrial internet of things: Blockchain application for energy management in smart cities2020/12/01English36
A novel honeypot based security approach for real-time intrusion detection and prevention systems2018/08/01English35
A new DCT-based robust image watermarking method using teaching-learning-Based optimization2019/08/01English33
A new transform domain steganography based on modified logistic chaotic map for color images2017/06/01English33