International Journal Of Information Security

International Journal Of Information Security

国际信息安全杂志

  • 4区 中科院分区
  • Q2 JCR分区

高引用文章

文章名称 引用次数
Talos: no more ransomware victims with formal methods 9
Structural analysis and detection of android botnets using machine learning techniques 8
A pairing-based cryptographic approach for data security in the cloud 7
Integrity-verifiable conjunctive keyword searchable encryption in cloud storage 7
A framework for estimating information security risk assessment method completeness: Core Unified Risk Framework, CURF 6
Certificateless designated verifier signature revisited: achieving a concrete scheme in the standard model 5
Double-spending prevention for Bitcoin zero-confirmation transactions 5
Stealing PINs via mobile sensors: actual risk versus user perception 4
Flexible ciphertext-policy attribute-based encryption supporting AND-gate and threshold with short ciphertexts 4
SpyDetector: An approach for detecting side-channel attacks at runtime 4
Dynamic searchable symmetric encryption for storing geospatial data in the cloud 4
Provably secure public-key encryption with conjunctive and subset keyword search 4
Leveraging cyber threat intelligence for a dynamic risk framework 3
Hydras and IPFS: a decentralised playground for malware 3
Scalable non-deterministic clustering-based k-anonymization for rich networks 3
Anonymous subject identification and privacy information management in video surveillance 2
A methodology to measure and monitor level of operational effectiveness of a CSOC 2
Accumulable optimistic fair exchange from verifiably encrypted homomorphic signatures 2
Ciphertext-policy attribute-based encryption supporting access policy update and its extension with preserved attributes 2
ZombieCoin 2.0: managing next-generation botnets using Bitcoin 2
A methodology for ensuring fair allocation of CSOC effort for alert investigation 2
Analyzing XACML policies using answer set programming 2
Dynamic malware detection and phylogeny analysis using process mining 2
Threshold privacy-preserving cloud auditing with multiple uploaders 2
Secure pattern matching based on bit parallelism: Non-interactive protocols for non-deterministic string matching automata evaluation 2
Encouraging users to improve password security and memorability 2
DDoS attack detection with feature engineering and machine learning: the framework and performance evaluation 2
Design and implementation of Negative Authentication System 2
Practical homomorphic encryption over the integers for secure computation in the cloud 2
SE-AOMDV: secure and efficient AOMDV routing protocol for vehicular communications 1
Signature schemes with a fuzzy private key 1
Differential audio analysis: a new side-channel attack on PIN pads 1
Commix: automating evaluation and exploitation of command injection vulnerabilities in Web applications 1
DOMtegrity: ensuring web page integrity against malicious browser extensions 1
Comparing apples with apples: performance analysis of lattice-based authenticated key exchange protocols 1
On practical privacy-preserving fault-tolerant data aggregation 1
Keyword-based private searching on cloud data along with keyword association and dissociation using cuckoo filter 1
Lattice-based deniable ring signatures 1
When time meets test 1
Supervised machine learning using encrypted training data 1
Efficient revocable hierarchical identity-based encryption using cryptographic accumulators 1
Enhanced Tacit Secrets: System-assigned passwords you can't write down, but don't need to 1
Multi-device anonymous authentication 1
Mobile botnets meet social networks: design and analysis of a new type of botnet 1
You click, I steal: analyzing and detecting click hijacking attacks in web pages 1
SSPFA: effective stack smashing protection for Android OS 1
Black-box detection of XQuery injection and parameter tampering vulnerabilities in web applications 1
Privacy-preserving smart metering revisited 1
Outsourced pattern matching 1
Using targeted Bayesian network learning for suspect identification in communication networks 1