Computers & Security

Papers
(The H4-Index of Computers & Security is 55. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2021-04-01 to 2025-04-01.)
ArticleCitations
Editorial Board366
Navigating Cybersecurity Governance: The influence of opportunity structures in socio-technical transitions for small and medium enterprises261
Multivariate time series anomaly detection with variational autoencoder and spatial–temporal graph network219
A classifications framework for continuous biometric authentication (2018–2024)182
How do mental models affect cybersecurity awareness? The roles of questioning styles, need for cognition, and graphical representations179
Privacy and security of wearable internet of things: A scoping review and conceptual framework development for safety and health management in construction150
E-WebGuard: Enhanced neural architectures for precision web attack detection138
Detecting interest flooding attacks in NDN: A probability-based event-driven approach135
RAF-AG: Report analysis framework for attack path generation134
Enhancing data integrity in opportunistic mobile social network: Leveraging Berkle Tree and secure data routing against attacks130
A hybrid scoring system for prioritization of software vulnerabilities126
Container security: Precaution levels, mitigation strategies, and research perspectives124
How to decrypt files encrypted by Rhysida ransomware without the attacker’s private key118
SCASS: Breaking into SCADA Systems Security113
Analysis of human reliability in detecting GPS spoofing on ECDIS in congested waterways under evidential reasoning and HEART approach112
A review of privacy-preserving biometric identification and authentication protocols110
A model-based approach for vulnerability analysis of IoT security protocols: The Z-Wave case study107
Design and implementation of a closed loop time delay feedback control (CLTD-FC) system for mitigating DDos attacks106
Editorial104
MAG-PUFs: Authenticating IoT devices via electromagnetic physical unclonable functions and deep learning98
The mediating role of security anxiety in internet threat avoidance behavior97
Optimism amid risk: How non-IT employees’ beliefs affect cybersecurity behavior94
Evaluation framework for quantum security risk assessment: A comprehensive strategy for quantum-safe transition91
Enhancing user identification through batch averaging of independent window subsequences using smartphone and wearable data85
A bio-inspired optimal feature with convolutional GhostNet based squeeze excited deep-scale capsule network for intrusion detection85
A privacy preservation method for multiple-source unstructured data in online social networks84
Efficient handover protocol for 5G and beyond networks83
Information security policy non-compliance: Can capitulation theory explain user behaviors?82
Examining usable security features and user perceptions of Physical Authentication Devices81
A novel cryptosystem based on DNA cryptography and randomly generated mealy machine74
Differential area analysis for ransomware attack detection within mixed file datasets72
IoT security certifications: Challenges and potential approaches71
Reading is not believing: A multimodal adversarial attacker for Chinese-NLP model69
AIS-NIDS: An intelligent and self-sustaining network intrusion detection system68
Defend against adversarial attacks in malware detection through attack space management68
IoTSecSim: A framework for modelling and simulation of security in Internet of things68
A lightweight packet forwarding verification in SDN using sketch67
Adaptive and maladaptive factors behind password manager use: A hope-extended protection motivation perspective67
Reducing fraud in organizations through information security policy compliance: An information security controls perspective61
An empirical analysis of the information security culture key factors framework61
Detecting abnormal logins by discovering anomalous links via graph transformers61
An ensemble of pre-trained transformer models for imbalanced multiclass malware classification60
Towards a cybersecurity culture-behaviour framework: A rapid evidence review60
MaDroid: A maliciousness-aware multifeatured dataset for detecting android malware59
Domain adaptation for Windows advanced persistent threat detection59
A GPU-based machine learning approach for detection of botnet attacks59
Machine learning-based early detection of IoT botnets using network-edge traffic59
Designing accurate lightweight intrusion detection systems for IoT networks using fine-tuned linear SVM and feature selectors58
A novel framework to identify cybersecurity challenges and opportunities for organizational digital transformation in the cloud58
Editorial Board58
HAE-HRL: A network intrusion detection system utilizing a novel autoencoder and a hybrid enhanced LSTM-CNN-based residual network57
Editorial Board57
Towards a metrics suite for evaluating cache side-channel vulnerability: Case studies on an open-source RISC-V processor57
A novel Evil Twin MiTM attack through 802.11v protocol exploitation56
Editorial Board55
GAMBD: Generating adversarial malware against MalConv55
Observational equivalence and security games: Enhancing the formal analysis of security protocols55
Editorial Board55
Beyond robustness: Resilience verification of tree-based classifiers55
0.56842112541199