Journal Of Information Security And Applications

Journal Of Information Security And Applications

信息安全与应用杂志

  • 2区 中科院分区
  • Q2 JCR分区

高引用文章

文章名称 引用次数
Internet of Things: A survey on the security of IoT frameworks 93
When an attacker meets a cipher-image in 2018: A year in review 58
Identification of malicious activities in industrial internet of things based on deep learning models 32
Cyber intrusion detection by combined feature selection algorithm 26
An efficient colour image encryption scheme based on 1-D chaotic maps 17
Secure multi-level permutation operation based multiple colour image encryption 15
A hybrid deep learning image-based analysis for effective malware detection 15
Image encryption using sequence generated by cyclic group 14
Hybrid secure and robust image watermarking scheme based on SVD and sharp frequency localized contourlet transform 13
A secure image encryption scheme based on cellular automata and chaotic skew tent map 13
A new DCT-based robust image watermarking method using teaching-learning-Based optimization 12
A review of image steganalysis techniques for digital forensics 11
An exploratory study of cyber hygiene behaviors and knowledge 11
A dynamic integrity verification scheme of cloud storage data based on lattice and Bloom filter 11
An improved certificateless aggregate signature scheme without bilinear pairings for vehicular ad hoc networks 10
Hybrid and blind watermarking scheme in DCuT - RDWT domain 10
Ransomware behavioural analysis on windows platforms 10
Motivation and opportunity based model to reduce information security insider threats in organisations 10
A systematic review on the status and progress of homomorphic encryption technologies 9
Detection of power grid disturbances and cyber-attacks based on machine learning 9
A highly robust and secure image watermarking based on classification and visual cryptography 9
A novel honeypot based security approach for real-time intrusion detection and prevention systems 8
Efficient privacy-preserving authentication framework for edge-assisted Internet of Drones 8
Enhanced AMBTC based data hiding method using hamming distance and pixel value differencing 8
A secure authentication protocol for wearable devices environment using ECC 7
SQL Injection Attack classification through the feature extraction of SQL query strings using a Gap-Weighted String Subsequence Kernel 7
A secure and lightweight authentication scheme for roaming service in global mobile networks 7
Network layer attacks and countermeasures in cognitive radio networks: A survey 7
Image steganography based on Canny edge detection, dilation operator and hybrid coding 7
A biometric security scheme for wireless body area networks 7
An encryption scheme for securing multiple medical images 6
A cryptographic model for better information security 6
SWORD: Semantic aWare andrOid malwaRe Detector 6
A lightweight multi-factor secure smart card based remote user authentication scheme for cloud-IoT applications 6
Application of local invariant symmetry features to detect and localize image copy move forgeries 6
Fraud detection for E-commerce transactions by employing a prudential Multiple Consensus model 6
Privacy preservation of data using crow search with adaptive awareness probability 6
Geometric transformation invariant block based copy-move forgery detection using fast and efficient hybrid local features 6
Quick response code and interference-based optical asymmetric cryptosystem 6
A framework for zero-day vulnerabilities detection and prioritization 6
A CCA-secure multi-conditional proxy broadcast re-encryption scheme for cloud storage system 6
Designing digital image encryption using 2D and 3D reversible modular chaotic maps 6
Design of a chaos-based encryption scheme for sensor data using a novel logarithmic chaotic map 6
A color image steganography in hybrid FRT-DWT domain 5
Image authentication scheme based on reversible fragile watermarking with two images 5
Traceable attribute-based signature 5
A Cluster Correlation power analysis against double blinding exponentiation 5
Histogram-pair based reversible data hiding via searching for optimal four thresholds 5
An analysis on the dimensions of information security culture concept: A review 5
ANSWERAUTH: A bimodal behavioral biometric-based user authentication scheme for smartphones 5