Computers & Security

Papers
(The TQCC of Computers & Security is 18. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2022-05-01 to 2026-05-01.)
ArticleCitations
Editorial Board307
VeracOS: An operating system extension for the veracity of files215
Editorial Board158
Reading is not believing: A multimodal adversarial attacker for Chinese-NLP model155
DynamicFuzz: Confidence-based directed greybox fuzzing for programs with unreliable call graphs141
Evaluating cyber attacks on central banks – identification of trends in cyber threat landscape134
FiPiBox:Development of firewall for IoT networks using P4Pi133
Cybersecurity preparedness of small-to-medium businesses: A Western Australia study with broader implications132
Influencing the security prioritisation of an agile software development project128
Defend against adversarial attacks in malware detection through attack space management126
GCN-MHSA: A novel malicious traffic detection method based on graph convolutional neural network and multi-head self-attention mechanism125
An analysis of zero-trust architecture and its cost-effectiveness for organizational security123
RETRACTED: I recognize you by your steps: Privacy impact of pedometer data121
A permission-carrying security policy and static enforcement for information flows in Android programs120
PPT: A privacy-preserving global model training protocol for federated learning in P2P networks120
Wasserstein distance guided feature Tokenizer transformer domain adaptation for network intrusion detection115
Investigating machine learning attacks on financial time series models114
BotPro: Data-driven tracking & profiling of IoT botnets in the wild110
The Reverse File System: Towards open cost-effective secure WORM storage devices for logging109
Analysis of human reliability in detecting GPS spoofing on ECDIS in congested waterways under evidential reasoning and HEART approach107
The Security Awareness Adventure: A serious game for security awareness training utilizing a state transition system and a probabilistic model107
Enhancing intrusion detection in containerized services: Assessing machine learning models and an advanced representation for system call data102
AttackNet: Enhancing biometric security via tailored convolutional neural network architectures for liveness detection100
Navigating Cybersecurity Governance: The influence of opportunity structures in socio-technical transitions for small and medium enterprises100
MADONNA: Browser-based malicious domain detection using Optimized Neural Network by leveraging AI and feature analysis97
Improving transferable adversarial attack via feature-momentum93
Cybersecurity optimization in supply chains under propagated cyberattacks93
A lightweight packet forwarding verification in SDN using sketch93
Exploring compiler optimization space for control flow obfuscation92
Towards a metrics suite for evaluating cache side-channel vulnerability: Case studies on an open-source RISC-V processor92
Security First, Security by Design, or Security Pragmatism – Strategic Roles of IT Security in Digitalization Projects92
A novel Evil Twin MiTM attack through 802.11v protocol exploitation89
Covert timing channel detection based on isolated binary trees89
Enhancing encrypted traffic analysis via source APIs: A robust approach for malicious traffic detection88
A typology of cybersecurity behavior among knowledge workers87
A bio-inspired optimal feature with convolutional GhostNet based squeeze excited deep-scale capsule network for intrusion detection87
Learning from cyber security incidents: A systematic review and future research agenda86
AIDTF: Adversarial training framework for network intrusion detection82
Multivariate time series anomaly detection with variational autoencoder and spatial–temporal graph network82
MGA-IDS: Optimal feature subset selection for anomaly detection framework on in-vehicle networks-CAN bus based on genetic algorithm and intrusion detection approach82
TrojanProbe: Fingerprinting Trojan tunnel implementations by actively probing crafted HTTP requests79
Exploring capacitive swipe gesture for user authentication using a new large dataset79
An anomaly detection model for in-vehicle networks based on lightweight convolution with spectral residuals78
A multi-type vulnerability detection framework with parallel perspective fusion and hierarchical feature enhancement77
New results on modeling and hybrid control for malware propagation in cyber–physical systems77
Multidimensional categorical data collection under shuffled differential privacy75
IDPFilter: Mitigating interdependent privacy issues in third-party apps75
Beyond the sandbox: Leveraging symbolic execution for evasive malware classification75
Detecting DBMS bugs with context-sensitive instantiation and multi-plan execution73
Multi-probability sampling-based detection of malicious switching nodes in SDN73
Web of shadows: Investigating malware abuse of internet services72
The Practice of Cyber-Threat Intelligence in Organizations: A Socio-Technical Case Study of a Mature Financial Organization72
The meta attack language - a formal description71
Understanding the chief information security officer: Qualifications and responsibilities for cybersecurity leadership70
PVFL: Verifiable federated learning and prediction with privacy-preserving69
NERO: NEural algorithmic reasoning for zeRO-day attack detection in the IoT: A hybrid approach69
Cognitively reconfigurable mimic-based heterogeneous password recovery system69
Insecure by design? A human-centric security perspective on AI-assisted software development67
Comparative evaluation of recent universal adversarial perturbations in image classification67
Examining the inconsistent effect of privacy control on privacy concerns in e-commerce services: The moderating role of privacy experience and risk propensity67
Assessing information security culture: A mixed-methods approach to navigating challenges in international corporate IT departments66
KPointer: Keep the code pointers on the stack point to the right code66
Forecasting cyber security threats landscape and associated technical trends in telehealth using Bidirectional Encoder Representations from Transformers (BERT)65
Would US citizens accept cybersecurity deresponsibilization? Perhaps not65
A large-scale analysis of the effectiveness of publicly reported security patches65
White-box content camouflage attacks against deep learning64
DeMal: Module decomposition of malware based on community discovery64
Improving transferability of adversarial examples by saliency distribution and data augmentation64
Foggier skies, clearer clouds: A real-time IoT-DDoS attack mitigation framework in fog-assisted software-defined cyber-physical systems64
PRIVIUM: A differentiated privacy-privilege model for user security and safety in the metaverse62
μ 62
Editorial Board62
SENSE: An unsupervised semantic learning model for cross-platform vulnerability search61
Privacy-preserving distributed clustering: A fully homomorphic encrypted approach for time series60
LiDAR point cloud transmission: Adversarial perspectives of spoofing attacks in autonomous driving60
Extended right-angle difference ternary co-relation pattern: A new feature descriptor for face anti-spoofing60
Attack smarter: Attention-driven fine-grained webpage fingerprinting attacks59
When expectation fails and motivation prevails: the mediating role of awareness in bridging the expectancy-capability gap in mobile identity protection59
Enhancing adversarial robustness for deep metric learning via neural discrete adversarial training58
GAIL-PT: An intelligent penetration testing framework with generative adversarial imitation learning58
Smart homes under siege: Assessing the robustness of physical security against wireless network attacks57
Faster secure and efficient collaborative private data cleaning based on PSI57
ICloud: An intrusion detection and dynamic defense mechanism for cloud environments57
Behind the scenes of attack graphs: Vulnerable network generator for in-depth experimental evaluation of attack graph scalability56
Formally verifying security protocols built on watermarking and jamming56
A Privacy-Preserving Framework for Endorsement Process in Hyperledger Fabric56
Adaptive edge security framework for dynamic IoT security policies in diverse environments55
Privacy preserving unique robust and revocable passcode generation from fingerprint data55
HT2ML: An efficient hybrid framework for privacy-preserving Machine Learning using HE and TEE54
Cross-site scripting detection with two-channel feature fusion embedded in self-attention mechanism54
Robust and reusable LINDDUN privacy threat knowledge54
Toward enhancing web privacy on HTTPS traffic: A novel SuperLearner attack model and an efficient defense approach with adversarial examples54
Fuzzing drones for anomaly detection: A systematic literature review54
Clustered federated learning architecture for network anomaly detection in large scale heterogeneous IoT networks54
RAIDS: Robust autoencoder-based intrusion detection system model against adversarial attacks53
Tamp-X: Attacking explainable natural language classifiers through tampered activations53
Improving adversarial transferability through hybrid augmentation53
Endpoint security reinforcement via integrated zero-trust systems: A collaborative approach53
You are your friends: Detecting malware via guilt-by-association and exempt-by-reputation52
FineGCP: Fine-grained dependency graph community partitioning for attack investigation52
BiTCN-TAEfficientNet malware classification approach based on sequence and RGB fusion52
Navigating challenging terrain surrounding DoD response to homeland attacks on critical infrastructure: Case studies of prior incidents utilizing an extended taxonomy of cyber harms51
Biometric masterkeys51
The modern cybersecurity analyst: An international position analysis51
Model update for intrusion detection: Analyzing the performance of delayed labeling and active learning strategies51
Add noise to remove noise: Local differential privacy for feature selection51
Personal CAPTCHA-based authentication protocol51
Cyber security and the Leviathan51
An efficient two-stage pipeline model with filtering algorithm for mislabeled malware detection51
Extending the classical side-channel analysis framework to access-driven cache attacks50
Editorial Board50
GONE: A generic O(1) NoisE layer for protecting privacy of deep neural networ50
AVX-TSCHA: Leaking information through AVX extensions in commercial processors50
PIXHELL: When pixels learn to scream49
VWA-6G AI assisted continuous security monitoring over open RAN service management orchestration49
Model-based structural and behavioral cybersecurity risk assessment in system designs49
Which algorithm can detect unknown attacks? Comparison of supervised, unsupervised and meta-learning algorithms for intrusion detection49
Improving the transferability of targeted adversarial examples by style-agnostic attack48
Integrity coded databases - protecting data integrity for outsourced databases48
APT beaconing detection: A systematic review48
Unawareness detection: Discovering black-box malicious models and quantifying privacy leakage risks48
ML-based intrusion detection system for precise APT cyber-clustering48
Cyber-attacks: Securing ship navigation systems using multi-layer cross-validation defense48
TIMFuser: A multi-granular fusion framework for cyber threat intelligence48
Erratum to ‘Ensemble transfer attack targeting text classification systems’ [Computers & Security 117 (2022) 1–8/ 102695]48
XLMR4MD: New Vietnamese dataset and framework for detecting the consistency of description and permission in Android applications using large language models47
Perspectives of non-expert users on cyber security and privacy: An analysis of online discussions on twitter47
BenchMFC: A benchmark dataset for trustworthy malware family classification under concept drift46
Using approximate matching and machine learning to uncover malicious activity in logs46
ILL-IDS: An incremental lifetime learning IDS for VANETs46
Dealing with uncertainty in cybersecurity decision support46
Conditional entropy-based hybrid DDoS detection model for IoT networks46
Adversarial training for deep learning-based cyberattack detection in IoT-based smart city applications45
An empirical study of vulnerability discovery methods over the past ten years45
Design, implementation, and automation of a risk management approach for man-at-the-End software protection44
Wavelet-based CSI reconstruction for improved wireless security through channel reciprocity44
FLADEN: Federated Learning for Anomaly DEtection in IoT Networks44
A Comprehensive Survey of Recent Internet Measurement Techniques for Cyber Security43
A classification-by-retrieval framework for few-shot anomaly detection to detect API injection43
NTLFlowLyzer: Towards generating an intrusion detection dataset and intruders behavior profiling through network and transport layers traffic analysis and pattern extraction43
A multi-source log semantic analysis-based attack investigation approach43
“I don't get it, but I accept it” Exploring uninformed consent to privacy policies: A neutralization perspective43
Cookie disclaimers: Dark patterns and lack of transparency43
Object-free backdoor attack and defense on semantic segmentation43
Integrating security in hazard analysis using STPA-Sec and GSPN: A case study of automatic emergency braking system42
Insights into security and privacy towards fog computing evolution42
Assessing the impact of packing on static machine learning-based malware detection and classification systems42
Analysis of statistical properties of variables in log data for advanced anomaly detection in cyber security42
Defending against BLE-based covert channels in crowdsourced location networks42
Detection and mitigation of vampire attacks with secure routing in WSN using weighted RNN and optimal path selection42
The applicability of a hybrid framework for automated phishing detection42
Vulnerability detection through machine learning-based fuzzing: A systematic review41
Multivocal literature review on zero-trust security implementation41
A critical survey of the security and privacy aspects of the Aadhaar framework40
A hybrid deep learning framework for privacy preservation in edge computing40
A new DDoS attacks intrusion detection model based on deep learning for cybersecurity40
Modelling language for cyber security incident handling for critical infrastructures40
A sequential deep learning framework for a robust and resilient network intrusion detection system40
Selective forwarding attack detection and network recovery mechanism based on cloud-edge cooperation in software-defined wireless sensor network40
Information security policies compliance in a global setting: An employee's perspective39
SMCD: Privacy-preserving deep learning based malicious code detection39
ADFL: Defending backdoor attacks in federated learning via adversarial distillation39
Detecting command injection vulnerabilities in Linux-based embedded firmware with LLM-based taint analysis of library functions39
CTISum: A new benchmark dataset for Cyber Threat Intelligence summarization39
Safeguarding connected autonomous vehicle communication: Protocols, intra- and inter-vehicular attacks and defenses39
Who are querying for me? Measuring the dependency and centralization in recursive resolution38
Editorial Board38
TTSAD: TCN-Transformer-SVDD Model for Anomaly Detection in air traffic ADS-B data38
SNDMI: Spyware network traffic detection method based on inducement operations38
Corrigendum to ‘Research on Lightweight Anomaly Detection of Multimedia Traffic in Edge Computing’ Computer & Security, 111(2021) 10246338
Optimized verifiable delegated private set intersection on outsourced private datasets38
Ibn Sina: A patient privacy‐preserving authentication protocol in medical internet of things38
Operations-informed incident response playbooks38
Secure and efficient application monitoring and replication without kernel patches37
Defense against underwater spy-robots: A distributed anti-theft topology control mechanism for insecure UASN37
Ensuring secure interoperation of access control in a multidomain environment37
Improving adversarial robustness through a curriculum-guided reliable distillation37
AdvCheck: Characterizing adversarial examples via local gradient checking37
Edge Implicit Weighting with graph transformers for robust intrusion detection in Internet of Things network37
Enhancing security and robustness of Cyphal on Controller Area Network in unmanned aerial vehicle environments37
GRAIN: Graph neural network and reinforcement learning aided causality discovery for multi-step attack scenario reconstruction36
Adaptive sensor attack detection and defense framework for autonomous vehicles based on density36
A review on client-server attacks and defenses in federated learning36
DMSCTS: Dynamic measurement scheme for the containers-hybrid-deployment based on trusted subsystem36
Cancelable iris template based on slicing36
Audio adversarial detection through classification score on speech recognition systems36
CPID: Insider threat detection using profiling and cyber-persona identification36
An automated closed-loop framework to enforce security policies from anomaly detection36
BeaCon: Automatic container policy generation using environment-aware dynamic analysis36
Governing cybersecurity from the boardroom: Challenges, drivers, and ways ahead36
A Proactive Approach to assess web application security through the integration of security tools in a Security Orchestration Platform36
A privacy-preserving handover authentication protocol for a group of MTC devices in 5G networks36
An optimized neural network for prediction of security threats on software testing36
Privacy-centered authentication: A new framework and analysis36
Enhancing can security with ML-based IDS: Strategies and efficacies against adversarial attacks35
An adaptive fuzzing method based on transformer and protocol similarity mutation35
Synthetic attack data generation model applying generative adversarial network for intrusion detection35
Enhancing cybersecurity in cloud computing and WSNs: A hybrid IDS approach35
A new deep boosted CNN and ensemble learning based IoT malware detection35
User-centric security analysis of MitID: The Danish passwordless digital identity solution35
Editorial Board35
FELACS: Federated learning with adaptive client selection for IoT DDoS attack detection35
Chameleon: Optimized feature selection using particle swarm optimization and ensemble methods for network anomaly detection35
A privacy-aware authentication and usage-controlled access protocol for IIoT decentralized data marketplace35
IoT security: On-chip secure deletion scheme using ECC modulation in IoT appliances34
Automated city shuttles: Mapping the key challenges in cybersecurity, privacy and standards to future developments34
Fast and practical intrusion detection system based on federated learning for VANET34
Statistical machine learning defensive mechanism against cyber intrusion in smart grid cyber-physical network34
Genetic programming for enhanced detection of Advanced Persistent Threats through feature construction34
VulGAI: vulnerability detection based on graphs and images34
Gradient-based defense methods for data leakage in vertical federated learning34
Improving monolithic kernel security and robustness through intra-kernel sandboxing34
ZKSA: Secure mutual Attestation against TOCTOU Zero-knowledge Proof based for IoT Devices34
An omnidirectional approach to touch-based continuous authentication33
SHAPE: An APT detection framework fusing semantic understanding and heterogeneous modeling33
Privacy-preserving spatiotemporal trajectory generalization publishing scheme with differential privacy33
Hilbert signal envelope-based multi-features methods for GNSS spoofing detection33
Transformer-based framework for alert aggregation and attack prediction in a multi-stage attack33
A login page transparency and visual similarity-based zero-day phishing defense protocol33
BD-MDLC: Behavior description-based enhanced malware detection for windows environment using longformer classifier33
Accountable, Scalable and DoS-resilient Secure Vehicular Communication33
STFT-TCAN: A TCN-attention based multivariate time series anomaly detection architecture with time-frequency analysis for cyber-industrial systems32
BinVulDet: Detecting vulnerability in binary program via decompiled pseudo code and BiLSTM-attention32
Time for De-cluttering: Digital clutter scaling for individuals and enterprises32
Ensemble transfer attack targeting text classification systems32
A lightweight deep learning framework for botnet detecting at the IoT edge32
Data reduction for black-box adversarial attacks against deep neural networks based on side-channel attacks32
Agriculture 4.0 and beyond: Evaluating cyber threat intelligence sources and techniques in smart farming ecosystems32
GSEDroid: GNN-based Android malware detection framework using lightweight semantic embedding32
Extending limited datasets with GAN-like self-supervision for SMS spam detection32
A cognitive security framework for detecting intrusions in IoT and 5G utilizing deep learning32
MER-GCN: Reasoning about attacking group behaviors using industrial control system attack knowledge graphs31
VERTFuzz: Version transformer-driven fuzzing for complex file parsers31
Updating Windows malware detectors: Balancing robustness and regression against adversarial EXEmples31
Erasure code backup system for data security31
Corrigendum to “Evaluation framework for quantum security risk assessment: A comprehensive strategy for quantum-safe transition” [Computers & Security, 150, 104272]31
SVulDetector: Vulnerability detection based on similarity using tree-based attention and weighted graph embedding mechanisms31
FS-IDS: A framework for intrusion detection based on few-shot learning31
Detection of anomalies of a non-deterministic software-defined networking control31
Know your enemy: Conversational agents for security, education, training, and awareness at scale31
CDDA-MD: An efficient malicious traffic detection method based on concept drift detection and adaptation technique30
Reducing false positives in bank anti-fraud systems based on rule induction in distributed tree-based models30
A Comprehensive Survey for IoT Security Datasets Taxonomy, Classification and Machine Learning Mechanisms30
AECR: Automatic attack technique intelligence extraction based on fine-tuned large language model30
A survey on the evolution of fileless attacks and detection techniques30
Stacking ensemble-based HIDS framework for detecting anomalous system processes in Windows based operating systems using multiple word embedding30
Network intrusion detection based on n-gram frequency and time-aware transformer30
RansoGuard: A RNN-based framework leveraging pre-attack sensitive APIs for early ransomware detection30
A systematic survey on physical layer security oriented to reconfigurable intelligent surface empowered 6G30
Unveiling encrypted traffic types through hierarchical network characteristics30
0.13666081428528