Computers & Security

Papers
(The H4-Index of Computers & Security is 57. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2021-08-01 to 2025-08-01.)
ArticleCitations
Editorial Board221
Reviewer Acknowledgement 2021216
A bio-inspired optimal feature with convolutional GhostNet based squeeze excited deep-scale capsule network for intrusion detection182
RETRACTED: I recognize you by your steps: Privacy impact of pedometer data160
Analysis of human reliability in detecting GPS spoofing on ECDIS in congested waterways under evidential reasoning and HEART approach151
TZMon: Improving mobile game security with ARM trustzone151
MADONNA: Browser-based malicious domain detection using Optimized Neural Network by leveraging AI and feature analysis138
Editorial Board128
Multivariate time series anomaly detection with variational autoencoder and spatial–temporal graph network121
Exploring compiler optimization space for control flow obfuscation117
A lightweight packet forwarding verification in SDN using sketch113
A traffic anomaly detection scheme for non-directional denial of service attacks in software-defined optical network108
A novel Evil Twin MiTM attack through 802.11v protocol exploitation105
Investigating machine learning attacks on financial time series models102
On Detecting and Classifying DGA Botnets and their Families101
Usable and secure? User perception of four authentication methods for mobile banking100
AttackNet: Enhancing biometric security via tailored convolutional neural network architectures for liveness detection99
Covert timing channel detection based on isolated binary trees94
Improving transferable adversarial attack via feature-momentum93
An analysis of zero-trust architecture and its cost-effectiveness for organizational security93
Enhancing intrusion detection in containerized services: Assessing machine learning models and an advanced representation for system call data87
MGA-IDS: Optimal feature subset selection for anomaly detection framework on in-vehicle networks-CAN bus based on genetic algorithm and intrusion detection approach87
Vulnerabilities in Android webview objects: Still not the end!85
The effectiveness of zoom touchscreen gestures for authentication and identification and its changes over time82
Towards a metrics suite for evaluating cache side-channel vulnerability: Case studies on an open-source RISC-V processor81
Reading is not believing: A multimodal adversarial attacker for Chinese-NLP model79
Security First, Security by Design, or Security Pragmatism – Strategic Roles of IT Security in Digitalization Projects78
A permission-carrying security policy and static enforcement for information flows in Android programs78
PPT: A privacy-preserving global model training protocol for federated learning in P2P networks77
The moderating effect of abusive supervision on information security policy compliance: Evidence from the hospitality industry76
Learning from cyber security incidents: A systematic review and future research agenda76
A typology of cybersecurity behavior among knowledge workers74
Navigating Cybersecurity Governance: The influence of opportunity structures in socio-technical transitions for small and medium enterprises74
Don’t get stung, cover your ICS in honey: How do honeypots fit within industrial control system security72
Influencing the security prioritisation of an agile software development project71
Defend against adversarial attacks in malware detection through attack space management70
Cloud computing security: A survey of service-based models70
A systematic literature review on online assessment security: Current challenges and integrity strategies68
AIDTF: Adversarial training framework for network intrusion detection66
GCN-MHSA: A novel malicious traffic detection method based on graph convolutional neural network and multi-head self-attention mechanism66
Cybersecurity preparedness of small-to-medium businesses: A Western Australia study with broader implications65
DeMal: Module decomposition of malware based on community discovery64
Understanding the chief information security officer: Qualifications and responsibilities for cybersecurity leadership64
Fuzzing drones for anomaly detection: A systematic literature review63
Formally verifying security protocols built on watermarking and jamming63
Improving transferability of adversarial examples by saliency distribution and data augmentation63
IDPFilter: Mitigating interdependent privacy issues in third-party apps62
Would US citizens accept cybersecurity deresponsibilization? Perhaps not62
Multidimensional categorical data collection under shuffled differential privacy62
Enhancing adversarial robustness for deep metric learning via neural discrete adversarial training62
Multi-probability sampling-based detection of malicious switching nodes in SDN59
Study on the latent state of Kaminsky-style DNS cache poisoning: Modeling and empirical analysis59
TrojanProbe: Fingerprinting Trojan tunnel implementations by actively probing crafted HTTP requests59
KPointer: Keep the code pointers on the stack point to the right code59
Cognitively reconfigurable mimic-based heterogeneous password recovery system58
A Privacy-Preserving Framework for Endorsement Process in Hyperledger Fabric58
Assessing information security culture: A mixed-methods approach to navigating challenges in international corporate IT departments58
Extended right-angle difference ternary co-relation pattern: A new feature descriptor for face anti-spoofing57
Cross-site scripting detection with two-channel feature fusion embedded in self-attention mechanism57
0.034370183944702