Computers & Security

Papers
(The H4-Index of Computers & Security is 57. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2021-06-01 to 2025-06-01.)
ArticleCitations
Editorial Board377
Reviewer Acknowledgement 2021200
A bio-inspired optimal feature with convolutional GhostNet based squeeze excited deep-scale capsule network for intrusion detection198
MADONNA: Browser-based malicious domain detection using Optimized Neural Network by leveraging AI and feature analysis165
Editorial Board147
AttackNet: Enhancing biometric security via tailored convolutional neural network architectures for liveness detection144
A lightweight packet forwarding verification in SDN using sketch141
Improving transferable adversarial attack via feature-momentum134
Analysis of human reliability in detecting GPS spoofing on ECDIS in congested waterways under evidential reasoning and HEART approach134
The moderating effect of abusive supervision on information security policy compliance: Evidence from the hospitality industry131
Don’t get stung, cover your ICS in honey: How do honeypots fit within industrial control system security125
A traffic anomaly detection scheme for non-directional denial of service attacks in software-defined optical network121
Learning from cyber security incidents: A systematic review and future research agenda115
Cybersecurity preparedness of small-to-medium businesses: A Western Australia study with broader implications115
Defend against adversarial attacks in malware detection through attack space management108
MGA-IDS: Optimal feature subset selection for anomaly detection framework on in-vehicle networks-CAN bus based on genetic algorithm and intrusion detection approach105
Vulnerabilities in Android webview objects: Still not the end!99
TZMon: Improving mobile game security with ARM trustzone98
Investigating machine learning attacks on financial time series models98
A novel Evil Twin MiTM attack through 802.11v protocol exploitation95
The effectiveness of zoom touchscreen gestures for authentication and identification and its changes over time95
Towards a metrics suite for evaluating cache side-channel vulnerability: Case studies on an open-source RISC-V processor92
A typology of cybersecurity behavior among knowledge workers91
Exploring compiler optimization space for control flow obfuscation86
Navigating Cybersecurity Governance: The influence of opportunity structures in socio-technical transitions for small and medium enterprises83
Reading is not believing: A multimodal adversarial attacker for Chinese-NLP model81
A systematic literature review on online assessment security: Current challenges and integrity strategies77
A permission-carrying security policy and static enforcement for information flows in Android programs77
Security First, Security by Design, or Security Pragmatism – Strategic Roles of IT Security in Digitalization Projects74
Usable and secure? User perception of four authentication methods for mobile banking72
Cloud computing security: A survey of service-based models72
GCN-MHSA: A novel malicious traffic detection method based on graph convolutional neural network and multi-head self-attention mechanism71
On Detecting and Classifying DGA Botnets and their Families71
PPT: A privacy-preserving global model training protocol for federated learning in P2P networks70
Covert timing channel detection based on isolated binary trees70
AIDTF: Adversarial training framework for network intrusion detection68
An analysis of zero-trust architecture and its cost-effectiveness for organizational security67
AutoVAS: An automated vulnerability analysis system with a deep learning approach66
Multivariate time series anomaly detection with variational autoencoder and spatial–temporal graph network66
Influencing the security prioritisation of an agile software development project65
RETRACTED: I recognize you by your steps: Privacy impact of pedometer data65
Understanding the chief information security officer: Qualifications and responsibilities for cybersecurity leadership64
DeMal: Module decomposition of malware based on community discovery64
Fuzzing drones for anomaly detection: A systematic literature review63
Comparative evaluation of recent universal adversarial perturbations in image classification63
Improving transferability of adversarial examples by saliency distribution and data augmentation62
White-box content camouflage attacks against deep learning62
Web of shadows: Investigating malware abuse of internet services61
Formally verifying security protocols built on watermarking and jamming61
Enhancing adversarial robustness for deep metric learning via neural discrete adversarial training61
Would US citizens accept cybersecurity deresponsibilization? Perhaps not61
Multidimensional categorical data collection under shuffled differential privacy60
: A lightweight and efficient network topology obfuscation defense scheme60
IDPFilter: Mitigating interdependent privacy issues in third-party apps59
HT2ML: An efficient hybrid framework for privacy-preserving Machine Learning using HE and TEE58
Multi-probability sampling-based detection of malicious switching nodes in SDN58
TrojanProbe: Fingerprinting Trojan tunnel implementations by actively probing crafted HTTP requests57
Examining the inconsistent effect of privacy control on privacy concerns in e-commerce services: The moderating role of privacy experience and risk propensity57
When expectation fails and motivation prevails: the mediating role of awareness in bridging the expectancy-capability gap in mobile identity protection57
0.031049013137817