Home
Research Trends
Papers list
Open Access Journals
All Journals
Search in Journals
Contact us
Journal of Information Security and Applications
Title
Publication Date
Language
Citations
Ransomware behavioural analysis on windows platforms
2018/06/01
English
22
AnswerAuth: A bimodal behavioral biometric-based user authentication scheme for smartphones
2019/02/01
English
22
The relation between information security events and firm market value, empirical evidence on recent disclosures: An extension of the GLZ study
2014/11/01
English
22
Integrating information quality dimensions into information security risk management (ISRM)
2017/10/01
English
21
Practical traceable multi-authority CP-ABE with outsourcing decryption and access policy updation
2020/04/01
English
21
Voting extreme learning machine based distributed denial of service attack detection in cloud computing
2020/08/01
English
21
Survey of false data injection in smart power grid: Attacks, countermeasures and challenges
2020/10/01
English
21
EASBF: An efficient authentication scheme over blockchain for fog computing-enabled internet of vehicles
2021/06/01
English
21
Applications of artificial immune systems to computer security: A survey
2017/08/01
English
21
Anonymity and closely related terms in the cyberspace: An analysis by example
2014/02/01
English
21
An IoT notion–based authentication and key agreement scheme ensuring user anonymity for heterogeneous ad hoc wireless sensor networks
2017/06/01
English
21
Bi-GISIS KE: Modified key exchange protocol with reusable keys for IoT security
2021/05/01
English
20
An efficient and secure anonymous mobility network authentication scheme
2014/02/01
English
20
Globalized firefly algorithm and chaos for designing substitution box
2020/12/01
English
20
Efficient and privacy-preserving authentication scheme for wireless body area networks
2020/06/01
English
20
A three-factor anonymous user authentication scheme for Internet of Things environments
2020/06/01
English
20
A lightweight multi-factor secure smart card based remote user authentication scheme for cloud-IoT applications
2018/10/01
English
20
Hybrid secure and robust image watermarking scheme based on SVD and sharp frequency localized contourlet transform
2019/02/01
English
20
Blind SVD-based audio watermarking using entropy and log-polar transformation
2015/02/01
English
19
Weaponized AI for cyber attacks
2021/03/01
English
19
Emergency role-based access control (E-RBAC) and analysis of model specifications with alloy
2019/04/01
English
19
Blockchain-Enabled healthcare system for detection of diabetes
2021/05/01
English
19
A lightweight and provable secure identity-based generalized proxy signcryption (IBGPS) scheme for Industrial Internet of Things (IIoT)
2021/05/01
English
19
SQL Injection Attack classification through the feature extraction of SQL query strings using a Gap-Weighted String Subsequence Kernel
2018/06/01
English
18
Cyber security attacks to modern vehicular systems
2017/10/01
English
18
Chaos and compressive sensing based novel image encryption scheme
2021/05/01
English
18
A robust copy-move forgery detection technique based on discrete cosine transform and cellular automata
2020/10/01
English
18
Clustering method and symmetric/asymmetric cryptography scheme adapted to securing urban VANET networks
2021/05/01
English
18
Cognitive security: A comprehensive study of cognitive science in cybersecurity
2019/10/01
English
18
High throughput and low area architectures of secure IoT algorithm for medical image encryption
2020/08/01
English
18
«
‹ Pervious
Next ›
»