Computers & Security

Papers
(The H4-Index of Computers & Security is 61. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2021-11-01 to 2025-11-01.)
ArticleCitations
Editorial Board246
MADONNA: Browser-based malicious domain detection using Optimized Neural Network by leveraging AI and feature analysis244
RETRACTED: I recognize you by your steps: Privacy impact of pedometer data196
Security First, Security by Design, or Security Pragmatism – Strategic Roles of IT Security in Digitalization Projects178
Reviewer Acknowledgement 2021176
Usable and secure? User perception of four authentication methods for mobile banking160
The moderating effect of abusive supervision on information security policy compliance: Evidence from the hospitality industry143
Towards a metrics suite for evaluating cache side-channel vulnerability: Case studies on an open-source RISC-V processor128
Editorial Board123
Influencing the security prioritisation of an agile software development project123
Investigating machine learning attacks on financial time series models123
Reading is not believing: A multimodal adversarial attacker for Chinese-NLP model116
Analysis of human reliability in detecting GPS spoofing on ECDIS in congested waterways under evidential reasoning and HEART approach110
Enhancing intrusion detection in containerized services: Assessing machine learning models and an advanced representation for system call data109
A systematic literature review on online assessment security: Current challenges and integrity strategies108
MGA-IDS: Optimal feature subset selection for anomaly detection framework on in-vehicle networks-CAN bus based on genetic algorithm and intrusion detection approach107
Improving transferable adversarial attack via feature-momentum103
A novel Evil Twin MiTM attack through 802.11v protocol exploitation102
Multivariate time series anomaly detection with variational autoencoder and spatial–temporal graph network100
Cloud computing security: A survey of service-based models95
Don’t get stung, cover your ICS in honey: How do honeypots fit within industrial control system security95
A bio-inspired optimal feature with convolutional GhostNet based squeeze excited deep-scale capsule network for intrusion detection94
On Detecting and Classifying DGA Botnets and their Families91
Evaluating cyber attacks on central banks – identification of trends in cyber threat landscape91
AIDTF: Adversarial training framework for network intrusion detection86
Enhancing encrypted traffic analysis via source APIs: A robust approach for malicious traffic detection86
Cybersecurity preparedness of small-to-medium businesses: A Western Australia study with broader implications86
GCN-MHSA: A novel malicious traffic detection method based on graph convolutional neural network and multi-head self-attention mechanism86
The Security Awareness Adventure: A serious game for security awareness training utilizing a state transition system and a probabilistic model85
Exploring compiler optimization space for control flow obfuscation84
A lightweight packet forwarding verification in SDN using sketch84
A traffic anomaly detection scheme for non-directional denial of service attacks in software-defined optical network84
Covert timing channel detection based on isolated binary trees81
FiPiBox:Development of firewall for IoT networks using P4Pi81
Wasserstein distance guided feature Tokenizer transformer domain adaptation for network intrusion detection79
Navigating Cybersecurity Governance: The influence of opportunity structures in socio-technical transitions for small and medium enterprises78
An analysis of zero-trust architecture and its cost-effectiveness for organizational security76
A permission-carrying security policy and static enforcement for information flows in Android programs76
Learning from cyber security incidents: A systematic review and future research agenda75
PPT: A privacy-preserving global model training protocol for federated learning in P2P networks75
A typology of cybersecurity behavior among knowledge workers73
Defend against adversarial attacks in malware detection through attack space management73
AttackNet: Enhancing biometric security via tailored convolutional neural network architectures for liveness detection71
VeracOS: An operating system extension for the veracity of files71
The effectiveness of zoom touchscreen gestures for authentication and identification and its changes over time70
Attack smarter: Attention-driven fine-grained webpage fingerprinting attacks69
Exploring capacitive swipe gesture for user authentication using a new large dataset68
A large-scale analysis of the effectiveness of publicly reported security patches67
PVFL: Verifiable federated learning and prediction with privacy-preserving67
Privacy-preserving distributed clustering: A fully homomorphic encrypted approach for time series66
Multidimensional categorical data collection under shuffled differential privacy66
Detecting DBMS bugs with context-sensitive instantiation and multi-plan execution66
New results on modeling and hybrid control for malware propagation in cyber–physical systems65
An adversarial learning framework with cross-domain loss for median filtered image restoration and anti-forensics65
TrojanProbe: Fingerprinting Trojan tunnel implementations by actively probing crafted HTTP requests64
Understanding the chief information security officer: Qualifications and responsibilities for cybersecurity leadership63
Multi-probability sampling-based detection of malicious switching nodes in SDN63
Web of shadows: Investigating malware abuse of internet services63
Formally verifying security protocols built on watermarking and jamming62
Toward enhancing web privacy on HTTPS traffic: A novel SuperLearner attack model and an efficient defense approach with adversarial examples62
When expectation fails and motivation prevails: the mediating role of awareness in bridging the expectancy-capability gap in mobile identity protection61
DeMal: Module decomposition of malware based on community discovery61
0.14271998405457