Home
Research Trends
Papers list
Open Access Journals
All Journals
Search in Journals
Contact us
Journal of Information Security and Applications
Title
Publication Date
Language
Citations
A secure image encryption scheme based on cellular automata and chaotic skew tent map
2019/04/01
English
31
Agent architecture of an intelligent medical system based on federated learning and blockchain technology
2021/05/01
English
30
Trust-aware and cooperative routing protocol for IoT security
2020/06/01
English
30
Secure mutual authentication and automated access control for IoT smart home using cumulative Keyed-hash chain
2019/04/01
English
29
A taxonomy for attack graph generation and usage in network security
2016/08/01
English
29
Adversarial attacks on machine learning cybersecurity defences in Industrial Control Systems
2021/05/01
English
28
Enhanced AMBTC based data hiding method using hamming distance and pixel value differencing
2019/08/01
English
28
A survey on behavioral biometric authentication on smartphones
2017/12/01
English
28
Secure multi–level permutation operation based multiple colour image encryption
2018/06/01
English
28
Combining ensemble methods and social network metrics for improving accuracy of OCSVM on intrusion detection in SCADA systems
2016/10/01
English
28
Attack classification of an intrusion detection system using deep learning and hyperparameter optimization
2021/05/01
English
28
Cyber security for fog-based smart grid SCADA systems: Solutions and challenges
2020/06/01
English
27
MLP-GA based algorithm to detect application layer DDoS attack
2017/10/01
English
27
Motivation and opportunity based model to reduce information security insider threats in organisations
2018/06/01
English
27
Blockchain-empowered cloud architecture based on secret sharing for smart city
2021/03/01
English
27
Cryptanalysis of an image block encryption algorithm based on chaotic maps
2020/10/01
English
27
A novel pseudo random sequence generator for image-cryptographic applications
2017/08/01
English
27
Image steganography based on Canny edge detection, dilation operator and hybrid coding
2018/08/01
English
26
A review of image steganalysis techniques for digital forensics
2018/06/01
English
26
ESEAP: ECC based secure and efficient mutual authentication protocol using smart card
2020/04/01
English
26
A TAN based hybrid model for android malware detection
2020/10/01
English
25
Steganography with pixel-value differencing and modulus function based on PSO
2018/12/01
English
24
Multi-view deep learning for zero-day Android malware detection
2021/05/01
English
24
An encryption scheme for securing multiple medical images
2019/12/01
English
24
Information security risks management framework – A step towards mitigating security risks in university network
2017/08/01
English
23
Blockchain and quantum blind signature-based hybrid scheme for healthcare 5.0 applications
2021/02/01
English
23
A secure blockchain-based e-health records storage and sharing scheme
2020/12/01
English
23
ECC based inter-device authentication and authorization scheme using MQTT for IoT networks
2019/06/01
English
23
Fraud detection for E-commerce transactions by employing a prudential Multiple Consensus model
2019/06/01
English
23
An analysis on the dimensions of information security culture concept: A review
2019/02/01
English
22
«
‹ Pervious
Next ›
»