Computers & Security

Papers
(The TQCC of Computers & Security is 16. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2021-08-01 to 2025-08-01.)
ArticleCitations
Editorial Board221
Reviewer Acknowledgement 2021216
A bio-inspired optimal feature with convolutional GhostNet based squeeze excited deep-scale capsule network for intrusion detection182
RETRACTED: I recognize you by your steps: Privacy impact of pedometer data160
Analysis of human reliability in detecting GPS spoofing on ECDIS in congested waterways under evidential reasoning and HEART approach151
TZMon: Improving mobile game security with ARM trustzone151
MADONNA: Browser-based malicious domain detection using Optimized Neural Network by leveraging AI and feature analysis138
Editorial Board128
Multivariate time series anomaly detection with variational autoencoder and spatial–temporal graph network121
Exploring compiler optimization space for control flow obfuscation117
A lightweight packet forwarding verification in SDN using sketch113
A traffic anomaly detection scheme for non-directional denial of service attacks in software-defined optical network108
A novel Evil Twin MiTM attack through 802.11v protocol exploitation105
Investigating machine learning attacks on financial time series models102
On Detecting and Classifying DGA Botnets and their Families101
Usable and secure? User perception of four authentication methods for mobile banking100
AttackNet: Enhancing biometric security via tailored convolutional neural network architectures for liveness detection99
Covert timing channel detection based on isolated binary trees94
An analysis of zero-trust architecture and its cost-effectiveness for organizational security93
Improving transferable adversarial attack via feature-momentum93
MGA-IDS: Optimal feature subset selection for anomaly detection framework on in-vehicle networks-CAN bus based on genetic algorithm and intrusion detection approach87
Enhancing intrusion detection in containerized services: Assessing machine learning models and an advanced representation for system call data87
Vulnerabilities in Android webview objects: Still not the end!85
The effectiveness of zoom touchscreen gestures for authentication and identification and its changes over time82
Towards a metrics suite for evaluating cache side-channel vulnerability: Case studies on an open-source RISC-V processor81
Reading is not believing: A multimodal adversarial attacker for Chinese-NLP model79
A permission-carrying security policy and static enforcement for information flows in Android programs78
Security First, Security by Design, or Security Pragmatism – Strategic Roles of IT Security in Digitalization Projects78
PPT: A privacy-preserving global model training protocol for federated learning in P2P networks77
The moderating effect of abusive supervision on information security policy compliance: Evidence from the hospitality industry76
Learning from cyber security incidents: A systematic review and future research agenda76
Navigating Cybersecurity Governance: The influence of opportunity structures in socio-technical transitions for small and medium enterprises74
A typology of cybersecurity behavior among knowledge workers74
Don’t get stung, cover your ICS in honey: How do honeypots fit within industrial control system security72
Influencing the security prioritisation of an agile software development project71
Cloud computing security: A survey of service-based models70
Defend against adversarial attacks in malware detection through attack space management70
A systematic literature review on online assessment security: Current challenges and integrity strategies68
GCN-MHSA: A novel malicious traffic detection method based on graph convolutional neural network and multi-head self-attention mechanism66
AIDTF: Adversarial training framework for network intrusion detection66
Cybersecurity preparedness of small-to-medium businesses: A Western Australia study with broader implications65
Understanding the chief information security officer: Qualifications and responsibilities for cybersecurity leadership64
DeMal: Module decomposition of malware based on community discovery64
Improving transferability of adversarial examples by saliency distribution and data augmentation63
Fuzzing drones for anomaly detection: A systematic literature review63
Formally verifying security protocols built on watermarking and jamming63
Enhancing adversarial robustness for deep metric learning via neural discrete adversarial training62
IDPFilter: Mitigating interdependent privacy issues in third-party apps62
Would US citizens accept cybersecurity deresponsibilization? Perhaps not62
Multidimensional categorical data collection under shuffled differential privacy62
TrojanProbe: Fingerprinting Trojan tunnel implementations by actively probing crafted HTTP requests59
KPointer: Keep the code pointers on the stack point to the right code59
Multi-probability sampling-based detection of malicious switching nodes in SDN59
Study on the latent state of Kaminsky-style DNS cache poisoning: Modeling and empirical analysis59
Assessing information security culture: A mixed-methods approach to navigating challenges in international corporate IT departments58
Cognitively reconfigurable mimic-based heterogeneous password recovery system58
A Privacy-Preserving Framework for Endorsement Process in Hyperledger Fabric58
Extended right-angle difference ternary co-relation pattern: A new feature descriptor for face anti-spoofing57
Cross-site scripting detection with two-channel feature fusion embedded in self-attention mechanism57
White-box content camouflage attacks against deep learning56
NERO: NEural algorithmic reasoning for zeRO-day attack detection in the IoT: A hybrid approach56
Tamp-X: Attacking explainable natural language classifiers through tampered activations56
Web of shadows: Investigating malware abuse of internet services56
BiTCN-TAEfficientNet malware classification approach based on sequence and RGB fusion56
A comprehensive deep learning benchmark for IoT IDS56
HT2ML: An efficient hybrid framework for privacy-preserving Machine Learning using HE and TEE56
Digestive neural networks: A novel defense strategy against inference attacks in federated learning55
An adversarial learning framework with cross-domain loss for median filtered image restoration and anti-forensics55
A Differentially private hybrid decomposition algorithm based on quad-tree54
Toward enhancing web privacy on HTTPS traffic: A novel SuperLearner attack model and an efficient defense approach with adversarial examples54
Android malware detection via an app similarity graph54
Beyond the sandbox: Leveraging symbolic execution for evasive malware classification54
Robust and reusable LINDDUN privacy threat knowledge54
Waste not: Using diverse neural networks from hyperparameter search for improved malware detection53
The meta attack language - a formal description52
A multi-type vulnerability detection framework with parallel perspective fusion and hierarchical feature enhancement52
An optimized differential privacy scheme with reinforcement learning in VANET51
Exploring capacitive swipe gesture for user authentication using a new large dataset51
: A lightweight and efficient network topology obfuscation defense scheme50
On the Effectiveness of Ransomware Decryption Tools50
A large-scale analysis of the effectiveness of publicly reported security patches50
You are your friends: Detecting malware via guilt-by-association and exempt-by-reputation49
Endpoint security reinforcement via integrated zero-trust systems: A collaborative approach49
GAIL-PT: An intelligent penetration testing framework with generative adversarial imitation learning48
When expectation fails and motivation prevails: the mediating role of awareness in bridging the expectancy-capability gap in mobile identity protection48
SENSE: An unsupervised semantic learning model for cross-platform vulnerability search48
A Systematical and longitudinal study of evasive behaviors in windows malware47
Foggier skies, clearer clouds: A real-time IoT-DDoS attack mitigation framework in fog-assisted software-defined cyber-physical systems47
Neuronal Jamming cyberattack over invasive BCIs affecting the resolution of tasks requiring visual capabilities47
Forecasting cyber security threats landscape and associated technical trends in telehealth using Bidirectional Encoder Representations from Transformers (BERT)46
Improving adversarial transferability through hybrid augmentation46
VDSimilar: Vulnerability detection based on code similarity of vulnerabilities and patches46
RAIDS: Robust autoencoder-based intrusion detection system model against adversarial attacks46
Adaptive edge security framework for dynamic IoT security policies in diverse environments45
An anomaly detection model for in-vehicle networks based on lightweight convolution with spectral residuals45
Smart homes under siege: Assessing the robustness of physical security against wireless network attacks45
PVFL: Verifiable federated learning and prediction with privacy-preserving45
Comparative evaluation of recent universal adversarial perturbations in image classification45
Erratum to ‘Ensemble transfer attack targeting text classification systems’ [Computers & Security 117 (2022) 1–8/ 102695]44
Examining the inconsistent effect of privacy control on privacy concerns in e-commerce services: The moderating role of privacy experience and risk propensity44
FLADEN: Federated Learning for Anomaly DEtection in IoT Networks44
Biometric masterkeys44
Clustered federated learning architecture for network anomaly detection in large scale heterogeneous IoT networks44
FineGCP: Fine-grained dependency graph community partitioning for attack investigation44
XLMR4MD: New Vietnamese dataset and framework for detecting the consistency of description and permission in Android applications using large language models44
KronoDroid: Time-based Hybrid-featured Dataset for Effective Android Malware Detection and Characterization44
FE-DaST: Fast and effective data-free substitute training for black-box adversarial attacks44
Using approximate matching and machine learning to uncover malicious activity in logs44
A Methodology For Large-Scale Identification of Related Accounts in Underground Forums43
TIMFuser: A multi-granular fusion framework for cyber threat intelligence43
AVX-TSCHA: Leaking information through AVX extensions in commercial processors43
Multivocal literature review on zero-trust security implementation42
Extending the classical side-channel analysis framework to access-driven cache attacks42
Wavelet-based CSI reconstruction for improved wireless security through channel reciprocity42
GONE: A generic O(1) NoisE layer for protecting privacy of deep neural networ42
Modelling language for cyber security incident handling for critical infrastructures41
A system to calculate Cyber Value-at-Risk41
NTLFlowLyzer: Towards generating an intrusion detection dataset and intruders behavior profiling through network and transport layers traffic analysis and pattern extraction41
A critical survey of the security and privacy aspects of the Aadhaar framework41
Information security policies compliance in a global setting: An employee's perspective41
Malbert: A novel pre-training method for malware detection40
An empirical study of vulnerability discovery methods over the past ten years40
ILL-IDS: An incremental lifetime learning IDS for VANETs40
Add noise to remove noise: Local differential privacy for feature selection40
A sequential deep learning framework for a robust and resilient network intrusion detection system39
A Comprehensive Survey of Recent Internet Measurement Techniques for Cyber Security39
Cookie disclaimers: Dark patterns and lack of transparency39
A classification-by-retrieval framework for few-shot anomaly detection to detect API injection38
Dealing with uncertainty in cybersecurity decision support38
Conditional entropy-based hybrid DDoS detection model for IoT networks38
Personal CAPTCHA-based authentication protocol38
Navigating challenging terrain surrounding DoD response to homeland attacks on critical infrastructure: Case studies of prior incidents utilizing an extended taxonomy of cyber harms38
ML-based intrusion detection system for precise APT cyber-clustering38
Editorial Board38
Integrity coded databases - protecting data integrity for outsourced databases37
A hybrid deep learning framework for privacy preservation in edge computing37
Selective forwarding attack detection and network recovery mechanism based on cloud-edge cooperation in software-defined wireless sensor network37
Analysis of statistical properties of variables in log data for advanced anomaly detection in cyber security37
Vulnerability detection through machine learning-based fuzzing: A systematic review37
Design, implementation, and automation of a risk management approach for man-at-the-End software protection37
“I don't get it, but I accept it” Exploring uninformed consent to privacy policies: A neutralization perspective37
An efficient two-stage pipeline model with filtering algorithm for mislabeled malware detection37
Avaddon ransomware: An in-depth analysis and decryption of infected systems36
APT beaconing detection: A systematic review36
Safeguarding connected autonomous vehicle communication: Protocols, intra- and inter-vehicular attacks and defenses36
Detecting command injection vulnerabilities in Linux-based embedded firmware with LLM-based taint analysis of library functions36
Cyber security and the Leviathan35
Insights into security and privacy towards fog computing evolution35
Object-free backdoor attack and defense on semantic segmentation35
Model update for intrusion detection: Analyzing the performance of delayed labeling and active learning strategies35
BenchMFC: A benchmark dataset for trustworthy malware family classification under concept drift35
Integrating security in hazard analysis using STPA-Sec and GSPN: A case study of automatic emergency braking system34
Which algorithm can detect unknown attacks? Comparison of supervised, unsupervised and meta-learning algorithms for intrusion detection34
Unawareness detection: Discovering black-box malicious models and quantifying privacy leakage risks34
A multi-source log semantic analysis-based attack investigation approach34
Perspectives of non-expert users on cyber security and privacy: An analysis of online discussions on twitter34
Binary code traceability of multigranularity information fusion from the perspective of software genes33
ADFL: Defending backdoor attacks in federated learning via adversarial distillation33
Hardening machine learning denial of service (DoS) defences against adversarial attacks in IoT smart home networks33
A new DDoS attacks intrusion detection model based on deep learning for cybersecurity33
Adversarial training for deep learning-based cyberattack detection in IoT-based smart city applications33
Adaptive sensor attack detection and defense framework for autonomous vehicles based on density33
The applicability of a hybrid framework for automated phishing detection33
Detection and mitigation of vampire attacks with secure routing in WSN using weighted RNN and optimal path selection33
Editorial Board32
A new deep boosted CNN and ensemble learning based IoT malware detection32
User-centric security analysis of MitID: The Danish passwordless digital identity solution32
SMCD: Privacy-preserving deep learning based malicious code detection32
DMSCTS: Dynamic measurement scheme for the containers-hybrid-deployment based on trusted subsystem32
Optimized verifiable delegated private set intersection on outsourced private datasets32
Cancelable iris template based on slicing32
Editorial Board32
Corrigendum to ‘Research on Lightweight Anomaly Detection of Multimedia Traffic in Edge Computing’ Computer & Security, 111(2021) 10246332
Ibn Sina: A patient privacy‐preserving authentication protocol in medical internet of things32
A Survey Of differential privacy-based techniques and their applicability to location-Based services31
A security type verifier for smart contracts31
Defense against underwater spy-robots: A distributed anti-theft topology control mechanism for insecure UASN31
Enhancing can security with ML-based IDS: Strategies and efficacies against adversarial attacks31
A privacy-preserving handover authentication protocol for a group of MTC devices in 5G networks31
SNDMI: Spyware network traffic detection method based on inducement operations31
An adaptive fuzzing method based on transformer and protocol similarity mutation30
Enhancing security and robustness of Cyphal on Controller Area Network in unmanned aerial vehicle environments30
AdvCheck: Characterizing adversarial examples via local gradient checking30
Improving adversarial robustness through a curriculum-guided reliable distillation30
Chameleon: Optimized feature selection using particle swarm optimization and ensemble methods for network anomaly detection30
Developing decision support for cybersecurity threat and incident managers30
An optimized neural network for prediction of security threats on software testing30
Privacy-centered authentication: A new framework and analysis30
Operations-informed incident response playbooks30
A Proactive Approach to assess web application security through the integration of security tools in a Security Orchestration Platform30
TTSAD: TCN-Transformer-SVDD Model for Anomaly Detection in air traffic ADS-B data30
Audio adversarial detection through classification score on speech recognition systems30
Ensuring secure interoperation of access control in a multidomain environment30
Dynamic user-centric access control for detection of ransomware attacks30
Edge Implicit Weighting with graph transformers for robust intrusion detection in Internet of Things network30
GRAIN: Graph neural network and reinforcement learning aided causality discovery for multi-step attack scenario reconstruction30
An automated closed-loop framework to enforce security policies from anomaly detection30
A review on client-server attacks and defenses in federated learning30
CPID: Insider threat detection using profiling and cyber-persona identification30
Stock market reactions to favorable and unfavorable information security events: A systematic literature review30
Governing cybersecurity from the boardroom: Challenges, drivers, and ways ahead29
CNN based method for the development of cyber-attacks detection algorithms in industrial control systems29
A Field-Sensitive Security Monitor for Object-Oriented Programs29
Time for De-cluttering: Digital clutter scaling for individuals and enterprises29
Modelling smart grid IT-OT dependencies for DDoS impact propagation29
VulGAI: vulnerability detection based on graphs and images29
IoT security: On-chip secure deletion scheme using ECC modulation in IoT appliances29
Synthetic attack data generation model applying generative adversarial network for intrusion detection29
ZKSA: Secure mutual Attestation against TOCTOU Zero-knowledge Proof based for IoT Devices29
Stacking ensemble-based HIDS framework for detecting anomalous system processes in Windows based operating systems using multiple word embedding29
A lightweight deep learning framework for botnet detecting at the IoT edge29
A Comprehensive Survey for IoT Security Datasets Taxonomy, Classification and Machine Learning Mechanisms29
Enhancing cybersecurity in cloud computing and WSNs: A hybrid IDS approach29
Editorial Board29
Evaluating fallback authentication research: A systematic literature review29
Automated city shuttles: Mapping the key challenges in cybersecurity, privacy and standards to future developments29
GSEDroid: GNN-based Android malware detection framework using lightweight semantic embedding29
Genetic programming for enhanced detection of Advanced Persistent Threats through feature construction28
A survey on the evolution of fileless attacks and detection techniques28
Dependable federated learning for IoT intrusion detection against poisoning attacks28
BinVulDet: Detecting vulnerability in binary program via decompiled pseudo code and BiLSTM-attention28
Reducing false positives in bank anti-fraud systems based on rule induction in distributed tree-based models28
A Novel Password Policy Focusing on Altering User Password Selection Habits: A Statistical Analysis on Breached Data28
Ensemble transfer attack targeting text classification systems28
Hilbert signal envelope-based multi-features methods for GNSS spoofing detection28
Fast and practical intrusion detection system based on federated learning for VANET27
FECC: DNS tunnel detection model based on CNN and clustering27
Identifying information security opinion leaders in organizations: Insights from the theory of social power bases and social network analysis27
A privacy-aware authentication and usage-controlled access protocol for IIoT decentralized data marketplace27
RansoGuard: A RNN-based framework leveraging pre-attack sensitive APIs for early ransomware detection27
Erasure code backup system for data security27
Unveiling encrypted traffic types through hierarchical network characteristics27
CDDA-MD: An efficient malicious traffic detection method based on concept drift detection and adaptation technique27
FS-IDS: A framework for intrusion detection based on few-shot learning27
Extending limited datasets with GAN-like self-supervision for SMS spam detection27
BD-MDLC: Behavior description-based enhanced malware detection for windows environment using longformer classifier27
Improving monolithic kernel security and robustness through intra-kernel sandboxing26
Gradient-based defense methods for data leakage in vertical federated learning26
A systematic survey on physical layer security oriented to reconfigurable intelligent surface empowered 6G26
Know your enemy: Conversational agents for security, education, training, and awareness at scale26
STFT-TCAN: A TCN-attention based multivariate time series anomaly detection architecture with time-frequency analysis for cyber-industrial systems26
"No point worrying" – The role of threat devaluation in information security behavior26
Editorial Board25
ITC: Intrusion tolerant controller for multicontroller SDN architecture25
Agriculture 4.0 and beyond: Evaluating cyber threat intelligence sources and techniques in smart farming ecosystems25
Boosting the transferability of adversarial CAPTCHAs25
Optimization of code caves in malware binaries to evade machine learning detectors25
Network intrusion detection based on n-gram frequency and time-aware transformer25
DNS root server resolution anomaly detection25
Practical attacks on Login CSRF in OAuth25
0.17727303504944