Journal of Information Security and Applications

Title Publication Date Language Citations
A secure image encryption scheme based on cellular automata and chaotic skew tent map2019/04/01English31
Agent architecture of an intelligent medical system based on federated learning and blockchain technology2021/05/01English30
Trust-aware and cooperative routing protocol for IoT security2020/06/01English30
Secure mutual authentication and automated access control for IoT smart home using cumulative Keyed-hash chain2019/04/01English29
A taxonomy for attack graph generation and usage in network security2016/08/01English29
Adversarial attacks on machine learning cybersecurity defences in Industrial Control Systems2021/05/01English28
Enhanced AMBTC based data hiding method using hamming distance and pixel value differencing2019/08/01English28
A survey on behavioral biometric authentication on smartphones2017/12/01English28
Secure multi–level permutation operation based multiple colour image encryption2018/06/01English28
Combining ensemble methods and social network metrics for improving accuracy of OCSVM on intrusion detection in SCADA systems2016/10/01English28
Attack classification of an intrusion detection system using deep learning and hyperparameter optimization2021/05/01English28
Cyber security for fog-based smart grid SCADA systems: Solutions and challenges2020/06/01English27
MLP-GA based algorithm to detect application layer DDoS attack2017/10/01English27
Motivation and opportunity based model to reduce information security insider threats in organisations2018/06/01English27
Blockchain-empowered cloud architecture based on secret sharing for smart city2021/03/01English27
Cryptanalysis of an image block encryption algorithm based on chaotic maps2020/10/01English27
A novel pseudo random sequence generator for image-cryptographic applications2017/08/01English27
Image steganography based on Canny edge detection, dilation operator and hybrid coding2018/08/01English26
A review of image steganalysis techniques for digital forensics2018/06/01English26
ESEAP: ECC based secure and efficient mutual authentication protocol using smart card2020/04/01English26
A TAN based hybrid model for android malware detection2020/10/01English25
Steganography with pixel-value differencing and modulus function based on PSO2018/12/01English24
Multi-view deep learning for zero-day Android malware detection2021/05/01English24
An encryption scheme for securing multiple medical images2019/12/01English24
Information security risks management framework – A step towards mitigating security risks in university network2017/08/01English23
Blockchain and quantum blind signature-based hybrid scheme for healthcare 5.0 applications2021/02/01English23
A secure blockchain-based e-health records storage and sharing scheme2020/12/01English23
ECC based inter-device authentication and authorization scheme using MQTT for IoT networks2019/06/01English23
Fraud detection for E-commerce transactions by employing a prudential Multiple Consensus model2019/06/01English23
An analysis on the dimensions of information security culture concept: A review2019/02/01English22