| Internet of Things: A survey on the security of IoT frameworks |
93 |
| When an attacker meets a cipher-image in 2018: A year in review |
58 |
| Identification of malicious activities in industrial internet of things based on deep learning models |
32 |
| Cyber intrusion detection by combined feature selection algorithm |
26 |
| An efficient colour image encryption scheme based on 1-D chaotic maps |
17 |
| Secure multi-level permutation operation based multiple colour image encryption |
15 |
| A hybrid deep learning image-based analysis for effective malware detection |
15 |
| Image encryption using sequence generated by cyclic group |
14 |
| Hybrid secure and robust image watermarking scheme based on SVD and sharp frequency localized contourlet transform |
13 |
| A secure image encryption scheme based on cellular automata and chaotic skew tent map |
13 |
| A new DCT-based robust image watermarking method using teaching-learning-Based optimization |
12 |
| A review of image steganalysis techniques for digital forensics |
11 |
| An exploratory study of cyber hygiene behaviors and knowledge |
11 |
| A dynamic integrity verification scheme of cloud storage data based on lattice and Bloom filter |
11 |
| An improved certificateless aggregate signature scheme without bilinear pairings for vehicular ad hoc networks |
10 |
| Hybrid and blind watermarking scheme in DCuT - RDWT domain |
10 |
| Ransomware behavioural analysis on windows platforms |
10 |
| Motivation and opportunity based model to reduce information security insider threats in organisations |
10 |
| A systematic review on the status and progress of homomorphic encryption technologies |
9 |
| Detection of power grid disturbances and cyber-attacks based on machine learning |
9 |
| A highly robust and secure image watermarking based on classification and visual cryptography |
9 |
| A novel honeypot based security approach for real-time intrusion detection and prevention systems |
8 |
| Efficient privacy-preserving authentication framework for edge-assisted Internet of Drones |
8 |
| Enhanced AMBTC based data hiding method using hamming distance and pixel value differencing |
8 |
| A secure authentication protocol for wearable devices environment using ECC |
7 |
| SQL Injection Attack classification through the feature extraction of SQL query strings using a Gap-Weighted String Subsequence Kernel |
7 |
| A secure and lightweight authentication scheme for roaming service in global mobile networks |
7 |
| Network layer attacks and countermeasures in cognitive radio networks: A survey |
7 |
| Image steganography based on Canny edge detection, dilation operator and hybrid coding |
7 |
| A biometric security scheme for wireless body area networks |
7 |
| An encryption scheme for securing multiple medical images |
6 |
| A cryptographic model for better information security |
6 |
| SWORD: Semantic aWare andrOid malwaRe Detector |
6 |
| A lightweight multi-factor secure smart card based remote user authentication scheme for cloud-IoT applications |
6 |
| Application of local invariant symmetry features to detect and localize image copy move forgeries |
6 |
| Fraud detection for E-commerce transactions by employing a prudential Multiple Consensus model |
6 |
| Privacy preservation of data using crow search with adaptive awareness probability |
6 |
| Geometric transformation invariant block based copy-move forgery detection using fast and efficient hybrid local features |
6 |
| Quick response code and interference-based optical asymmetric cryptosystem |
6 |
| A framework for zero-day vulnerabilities detection and prioritization |
6 |
| A CCA-secure multi-conditional proxy broadcast re-encryption scheme for cloud storage system |
6 |
| Designing digital image encryption using 2D and 3D reversible modular chaotic maps |
6 |
| Design of a chaos-based encryption scheme for sensor data using a novel logarithmic chaotic map |
6 |
| A color image steganography in hybrid FRT-DWT domain |
5 |
| Image authentication scheme based on reversible fragile watermarking with two images |
5 |
| Traceable attribute-based signature |
5 |
| A Cluster Correlation power analysis against double blinding exponentiation |
5 |
| Histogram-pair based reversible data hiding via searching for optimal four thresholds |
5 |
| An analysis on the dimensions of information security culture concept: A review |
5 |
| ANSWERAUTH: A bimodal behavioral biometric-based user authentication scheme for smartphones |
5 |