Home
Research Trends
Papers list
Open Access Journals
All Journals
Search in Journals
Contact us
Journal of Information Security and Applications
Title
Publication Date
Language
Citations
Blockchain-based electronic healthcare record system for healthcare 4.0 applications
2020/02/01
English
244
Internet of Things: A survey on the security of IoT frameworks
2018/02/01
English
241
Deep learning for cyber security intrusion detection: Approaches, datasets, and comparative study
2020/02/01
English
220
Advanced social engineering attacks
2015/06/01
English
127
Identification of malicious activities in industrial internet of things based on deep learning models
2018/08/01
English
89
When an attacker meets a cipher-image in 2018: A year in review
2019/10/01
English
87
Cyber intrusion detection by combined feature selection algorithm
2019/02/01
English
83
A hybrid deep learning image-based analysis for effective malware detection
2019/08/01
English
67
Blockchain based secured information sharing protocol in supply chain management system with key distribution mechanism
2020/10/01
English
64
Detection of power grid disturbances and cyber-attacks based on machine learning
2019/06/01
English
59
Colour image encryption algorithm combining Arnold map, DNA sequence operation, and a Mandelbrot set
2020/02/01
English
59
A Deep Learning-based Cryptocurrency Price Prediction Scheme for Financial Institutions
2020/12/01
English
56
Multiple grayscale image encryption using cross-coupled chaotic maps
2020/06/01
English
55
Efficient privacy-preserving authentication framework for edge-assisted Internet of Drones
2019/10/01
English
55
An exploratory study of cyber hygiene behaviors and knowledge
2018/10/01
English
54
STPA-SafeSec: Safety and security analysis for cyber-physical systems
2017/06/01
English
48
An improved certificateless aggregate signature scheme without bilinear pairings for vehicular ad hoc networks
2019/02/01
English
48
A lightweight biometrics based remote user authentication scheme for IoT services
2017/06/01
English
45
A robust authentication and access control protocol for securing wireless healthcare sensor networks
2020/06/01
English
42
Computational intelligence intrusion detection techniques in mobile cloud computing environments: Review, taxonomy, and open research issues
2020/12/01
English
42
An access control model for cloud computing
2014/02/01
English
40
Enhanced credit card fraud detection based on SVM-recursive feature elimination and hyper-parameters optimization
2020/12/01
English
39
Deterministic chaos game: A new fractal based pseudo-random number generator and its cryptographic application
2020/06/01
English
39
Security and privacy of UAV data using blockchain technology
2020/12/01
English
38
An efficient colour image encryption scheme based on 1-D chaotic maps
2019/06/01
English
38
Implementation and practical problems of chaos-based cryptography revisited
2020/02/01
English
36
Dynamic pricing in industrial internet of things: Blockchain application for energy management in smart cities
2020/12/01
English
36
A novel honeypot based security approach for real-time intrusion detection and prevention systems
2018/08/01
English
35
A new DCT-based robust image watermarking method using teaching-learning-Based optimization
2019/08/01
English
33
A new transform domain steganography based on modified logistic chaotic map for color images
2017/06/01
English
33
«
‹ Pervious
Next ›
»