Computers & Security

Papers
(The H4-Index of Computers & Security is 59. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2021-09-01 to 2025-09-01.)
ArticleCitations
Editorial Board227
Reviewer Acknowledgement 2021226
A bio-inspired optimal feature with convolutional GhostNet based squeeze excited deep-scale capsule network for intrusion detection192
RETRACTED: I recognize you by your steps: Privacy impact of pedometer data169
MADONNA: Browser-based malicious domain detection using Optimized Neural Network by leveraging AI and feature analysis160
Editorial Board150
Usable and secure? User perception of four authentication methods for mobile banking142
Covert timing channel detection based on isolated binary trees136
Investigating machine learning attacks on financial time series models125
Navigating Cybersecurity Governance: The influence of opportunity structures in socio-technical transitions for small and medium enterprises121
A lightweight packet forwarding verification in SDN using sketch118
A traffic anomaly detection scheme for non-directional denial of service attacks in software-defined optical network113
Multivariate time series anomaly detection with variational autoencoder and spatial–temporal graph network108
Exploring compiler optimization space for control flow obfuscation108
Enhancing encrypted traffic analysis via source APIs: A robust approach for malicious traffic detection105
The Security Awareness Adventure: A serious game for security awareness training utilizing a state transition system and a probabilistic model104
Improving transferable adversarial attack via feature-momentum103
MGA-IDS: Optimal feature subset selection for anomaly detection framework on in-vehicle networks-CAN bus based on genetic algorithm and intrusion detection approach96
Defend against adversarial attacks in malware detection through attack space management96
AIDTF: Adversarial training framework for network intrusion detection96
Vulnerabilities in Android webview objects: Still not the end!95
The effectiveness of zoom touchscreen gestures for authentication and identification and its changes over time90
Towards a metrics suite for evaluating cache side-channel vulnerability: Case studies on an open-source RISC-V processor89
Reading is not believing: A multimodal adversarial attacker for Chinese-NLP model85
Security First, Security by Design, or Security Pragmatism – Strategic Roles of IT Security in Digitalization Projects83
PPT: A privacy-preserving global model training protocol for federated learning in P2P networks83
The moderating effect of abusive supervision on information security policy compliance: Evidence from the hospitality industry82
Influencing the security prioritisation of an agile software development project82
TZMon: Improving mobile game security with ARM trustzone80
An analysis of zero-trust architecture and its cost-effectiveness for organizational security79
Learning from cyber security incidents: A systematic review and future research agenda79
Enhancing intrusion detection in containerized services: Assessing machine learning models and an advanced representation for system call data78
A permission-carrying security policy and static enforcement for information flows in Android programs77
A novel Evil Twin MiTM attack through 802.11v protocol exploitation75
Cybersecurity preparedness of small-to-medium businesses: A Western Australia study with broader implications74
A systematic literature review on online assessment security: Current challenges and integrity strategies73
Analysis of human reliability in detecting GPS spoofing on ECDIS in congested waterways under evidential reasoning and HEART approach73
Don’t get stung, cover your ICS in honey: How do honeypots fit within industrial control system security69
Cloud computing security: A survey of service-based models69
GCN-MHSA: A novel malicious traffic detection method based on graph convolutional neural network and multi-head self-attention mechanism68
AttackNet: Enhancing biometric security via tailored convolutional neural network architectures for liveness detection68
On Detecting and Classifying DGA Botnets and their Families68
A typology of cybersecurity behavior among knowledge workers67
DeMal: Module decomposition of malware based on community discovery67
Formally verifying security protocols built on watermarking and jamming66
Improving transferability of adversarial examples by saliency distribution and data augmentation66
Fuzzing drones for anomaly detection: A systematic literature review66
Multi-probability sampling-based detection of malicious switching nodes in SDN65
IDPFilter: Mitigating interdependent privacy issues in third-party apps65
Would US citizens accept cybersecurity deresponsibilization? Perhaps not65
TrojanProbe: Fingerprinting Trojan tunnel implementations by actively probing crafted HTTP requests64
KPointer: Keep the code pointers on the stack point to the right code63
Study on the latent state of Kaminsky-style DNS cache poisoning: Modeling and empirical analysis63
A Privacy-Preserving Framework for Endorsement Process in Hyperledger Fabric63
Cognitively reconfigurable mimic-based heterogeneous password recovery system62
Cross-site scripting detection with two-channel feature fusion embedded in self-attention mechanism61
HT2ML: An efficient hybrid framework for privacy-preserving Machine Learning using HE and TEE60
White-box content camouflage attacks against deep learning60
BiTCN-TAEfficientNet malware classification approach based on sequence and RGB fusion60
An adversarial learning framework with cross-domain loss for median filtered image restoration and anti-forensics59
Digestive neural networks: A novel defense strategy against inference attacks in federated learning59
Web of shadows: Investigating malware abuse of internet services59
NERO: NEural algorithmic reasoning for zeRO-day attack detection in the IoT: A hybrid approach59
0.10370802879333