Computers & Security

Papers
(The H4-Index of Computers & Security is 53. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2020-05-01 to 2024-05-01.)
ArticleCitations
Cyber security in the age of COVID-19: A timeline and analysis of cyber-crime and cyber-attacks during the pandemic297
Applications of blockchain in ensuring the security and privacy of electronic health record systems: A survey237
Image-Based malware classification using ensemble of CNN architectures (IMCEC)213
Building Auto-Encoder Intrusion Detection System based on random forest feature selection191
A deep learning method with wrapper based feature extraction for wireless intrusion detection system191
Cybersecurity for autonomous vehicles: Review of attacks and defense178
IoT malicious traffic identification using wrapper-based feature selection mechanisms170
An effective intrusion detection approach using SVM with naïve Bayes feature embedding152
SwiftIDS: Real-time intrusion detection system based on LightGBM and parallel intrusion detection mechanism106
A dynamic Windows malware detection and prediction method based on contextual understanding of API call sequence103
Privacy preservation in federated learning: An insightful survey from the GDPR perspective102
Resource allocation and trust computing for blockchain-enabled edge computing system101
A systematic literature review of methods and datasets for anomaly-based network intrusion detection95
Byte-level malware classification based on markov images and deep learning94
A fast network intrusion detection system using adaptive synthetic oversampling and LightGBM92
Deep learning for insider threat detection: Review, challenges and opportunities90
The internet of things security: A survey encompassing unexplored areas and new insights87
A blockchain-based scheme for privacy-preserving and secure sharing of medical data87
GDroid: Android malware detection and classification with graph convolutional network85
Integration of blockchain and federated learning for Internet of Things: Recent advances and future challenges83
Defining organisational information security culture—Perspectives from academia and industry80
A survey on methods and challenges in EEG based authentication77
A survey on wireless body area networks: architecture, security challenges and research opportunities76
A zero-knowledge-proof-based digital identity management scheme in blockchain76
Riskio: A Serious Game for Cyber Security Awareness and Education76
AMalNet: A deep learning framework based on graph convolutional networks for malware detection73
Ransomware: Recent advances, analysis, challenges and future research directions71
Never trust, always verify: A multivocal literature review on current knowledge and research gaps of zero-trust71
Enhancing employees information security awareness in private and public organisations: A systematic literature review71
STL-HDL: A new hybrid network intrusion detection system for imbalanced dataset on big data environment70
APT datasets and attack modeling for automated detection methods: A review70
A survey of empirical performance evaluation of permissioned blockchain platforms: Challenges and opportunities70
Detecting stealthy false data injection attacks in the smart grid using ensemble-based machine learning69
HYDRA: A multimodal deep learning framework for malware classification69
An effective genetic algorithm-based feature selection method for intrusion detection systems69
Developing cybersecurity culture to influence employee behavior: A practice perspective68
A novel combinatorial optimization based feature selection method for network intrusion detection67
A survey on security attacks and defense techniques for connected and autonomous vehicles65
EfficientNet convolutional neural networks-based Android malware detection64
Privacy Preserving Face Recognition Utilizing Differential Privacy64
CSE-IDS: Using cost-sensitive deep learning and ensemble algorithms to handle class imbalance in network-based intrusion detection systems64
Anomaly detection in Industrial Control Systems using Logical Analysis of Data63
Intrusion detection methods based on integrated deep learning model61
Highly efficient federated learning with strong privacy preservation in cloud computing60
The Ransomware-as-a-Service economy within the darknet60
A novel architecture for web-based attack detection using convolutional neural network59
Integration of federated machine learning and blockchain for the provision of secure big data analytics for Internet of Things58
JOWMDroid: Android malware detection based on feature weighting with joint optimization of weight-mapping and classifier parameters58
Catch them alive: A malware detection approach through memory forensics, manifold learning and computer vision58
TIMiner: Automatically extracting and analyzing categorized cyber threat intelligence from social data58
How can organizations develop situation awareness for incident response: A case study of management practice56
System log clustering approaches for cyber security applications: A survey55
Developing a cyber security culture: Current practices and future needs54
0.033593893051147