Computers & Security

Papers
(The TQCC of Computers & Security is 16. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2021-11-01 to 2025-11-01.)
ArticleCitations
Editorial Board246
MADONNA: Browser-based malicious domain detection using Optimized Neural Network by leveraging AI and feature analysis244
RETRACTED: I recognize you by your steps: Privacy impact of pedometer data196
Security First, Security by Design, or Security Pragmatism – Strategic Roles of IT Security in Digitalization Projects178
Reviewer Acknowledgement 2021176
Usable and secure? User perception of four authentication methods for mobile banking160
The moderating effect of abusive supervision on information security policy compliance: Evidence from the hospitality industry143
Towards a metrics suite for evaluating cache side-channel vulnerability: Case studies on an open-source RISC-V processor128
Influencing the security prioritisation of an agile software development project123
Investigating machine learning attacks on financial time series models123
Editorial Board123
Reading is not believing: A multimodal adversarial attacker for Chinese-NLP model116
Analysis of human reliability in detecting GPS spoofing on ECDIS in congested waterways under evidential reasoning and HEART approach110
Enhancing intrusion detection in containerized services: Assessing machine learning models and an advanced representation for system call data109
A systematic literature review on online assessment security: Current challenges and integrity strategies108
MGA-IDS: Optimal feature subset selection for anomaly detection framework on in-vehicle networks-CAN bus based on genetic algorithm and intrusion detection approach107
Improving transferable adversarial attack via feature-momentum103
A novel Evil Twin MiTM attack through 802.11v protocol exploitation102
Multivariate time series anomaly detection with variational autoencoder and spatial–temporal graph network100
Don’t get stung, cover your ICS in honey: How do honeypots fit within industrial control system security95
Cloud computing security: A survey of service-based models95
A bio-inspired optimal feature with convolutional GhostNet based squeeze excited deep-scale capsule network for intrusion detection94
On Detecting and Classifying DGA Botnets and their Families91
Evaluating cyber attacks on central banks – identification of trends in cyber threat landscape91
Enhancing encrypted traffic analysis via source APIs: A robust approach for malicious traffic detection86
Cybersecurity preparedness of small-to-medium businesses: A Western Australia study with broader implications86
GCN-MHSA: A novel malicious traffic detection method based on graph convolutional neural network and multi-head self-attention mechanism86
AIDTF: Adversarial training framework for network intrusion detection86
The Security Awareness Adventure: A serious game for security awareness training utilizing a state transition system and a probabilistic model85
A lightweight packet forwarding verification in SDN using sketch84
A traffic anomaly detection scheme for non-directional denial of service attacks in software-defined optical network84
Exploring compiler optimization space for control flow obfuscation84
Covert timing channel detection based on isolated binary trees81
FiPiBox:Development of firewall for IoT networks using P4Pi81
Wasserstein distance guided feature Tokenizer transformer domain adaptation for network intrusion detection79
Navigating Cybersecurity Governance: The influence of opportunity structures in socio-technical transitions for small and medium enterprises78
A permission-carrying security policy and static enforcement for information flows in Android programs76
An analysis of zero-trust architecture and its cost-effectiveness for organizational security76
Learning from cyber security incidents: A systematic review and future research agenda75
PPT: A privacy-preserving global model training protocol for federated learning in P2P networks75
Defend against adversarial attacks in malware detection through attack space management73
A typology of cybersecurity behavior among knowledge workers73
VeracOS: An operating system extension for the veracity of files71
AttackNet: Enhancing biometric security via tailored convolutional neural network architectures for liveness detection71
The effectiveness of zoom touchscreen gestures for authentication and identification and its changes over time70
Attack smarter: Attention-driven fine-grained webpage fingerprinting attacks69
Exploring capacitive swipe gesture for user authentication using a new large dataset68
A large-scale analysis of the effectiveness of publicly reported security patches67
PVFL: Verifiable federated learning and prediction with privacy-preserving67
Multidimensional categorical data collection under shuffled differential privacy66
Detecting DBMS bugs with context-sensitive instantiation and multi-plan execution66
Privacy-preserving distributed clustering: A fully homomorphic encrypted approach for time series66
An adversarial learning framework with cross-domain loss for median filtered image restoration and anti-forensics65
New results on modeling and hybrid control for malware propagation in cyber–physical systems65
TrojanProbe: Fingerprinting Trojan tunnel implementations by actively probing crafted HTTP requests64
Multi-probability sampling-based detection of malicious switching nodes in SDN63
Web of shadows: Investigating malware abuse of internet services63
Understanding the chief information security officer: Qualifications and responsibilities for cybersecurity leadership63
Formally verifying security protocols built on watermarking and jamming62
Toward enhancing web privacy on HTTPS traffic: A novel SuperLearner attack model and an efficient defense approach with adversarial examples62
DeMal: Module decomposition of malware based on community discovery61
When expectation fails and motivation prevails: the mediating role of awareness in bridging the expectancy-capability gap in mobile identity protection61
Improving transferability of adversarial examples by saliency distribution and data augmentation60
A multi-type vulnerability detection framework with parallel perspective fusion and hierarchical feature enhancement59
Clustered federated learning architecture for network anomaly detection in large scale heterogeneous IoT networks58
Would US citizens accept cybersecurity deresponsibilization? Perhaps not58
HT2ML: An efficient hybrid framework for privacy-preserving Machine Learning using HE and TEE58
You are your friends: Detecting malware via guilt-by-association and exempt-by-reputation58
A Privacy-Preserving Framework for Endorsement Process in Hyperledger Fabric58
Cross-site scripting detection with two-channel feature fusion embedded in self-attention mechanism58
Enhancing adversarial robustness for deep metric learning via neural discrete adversarial training57
An anomaly detection model for in-vehicle networks based on lightweight convolution with spectral residuals55
Study on the latent state of Kaminsky-style DNS cache poisoning: Modeling and empirical analysis55
Tamp-X: Attacking explainable natural language classifiers through tampered activations54
SENSE: An unsupervised semantic learning model for cross-platform vulnerability search54
Foggier skies, clearer clouds: A real-time IoT-DDoS attack mitigation framework in fog-assisted software-defined cyber-physical systems54
Improving adversarial transferability through hybrid augmentation54
KPointer: Keep the code pointers on the stack point to the right code54
Fuzzing drones for anomaly detection: A systematic literature review54
On the Effectiveness of Ransomware Decryption Tools54
The meta attack language - a formal description54
Beyond the sandbox: Leveraging symbolic execution for evasive malware classification53
RAIDS: Robust autoencoder-based intrusion detection system model against adversarial attacks53
White-box content camouflage attacks against deep learning53
: A lightweight and efficient network topology obfuscation defense scheme52
Extended right-angle difference ternary co-relation pattern: A new feature descriptor for face anti-spoofing51
Endpoint security reinforcement via integrated zero-trust systems: A collaborative approach51
A comprehensive deep learning benchmark for IoT IDS51
Forecasting cyber security threats landscape and associated technical trends in telehealth using Bidirectional Encoder Representations from Transformers (BERT)51
Behind the scenes of attack graphs: Vulnerable network generator for in-depth experimental evaluation of attack graph scalability50
Robust and reusable LINDDUN privacy threat knowledge50
Cognitively reconfigurable mimic-based heterogeneous password recovery system50
Assessing information security culture: A mixed-methods approach to navigating challenges in international corporate IT departments50
Neuronal Jamming cyberattack over invasive BCIs affecting the resolution of tasks requiring visual capabilities49
IDPFilter: Mitigating interdependent privacy issues in third-party apps49
Examining the inconsistent effect of privacy control on privacy concerns in e-commerce services: The moderating role of privacy experience and risk propensity48
Adaptive edge security framework for dynamic IoT security policies in diverse environments48
Smart homes under siege: Assessing the robustness of physical security against wireless network attacks48
Comparative evaluation of recent universal adversarial perturbations in image classification48
KronoDroid: Time-based Hybrid-featured Dataset for Effective Android Malware Detection and Characterization47
GAIL-PT: An intelligent penetration testing framework with generative adversarial imitation learning47
A Systematical and longitudinal study of evasive behaviors in windows malware47
LiDAR point cloud transmission: Adversarial perspectives of spoofing attacks in autonomous driving47
An optimized differential privacy scheme with reinforcement learning in VANET47
BiTCN-TAEfficientNet malware classification approach based on sequence and RGB fusion47
NERO: NEural algorithmic reasoning for zeRO-day attack detection in the IoT: A hybrid approach46
Using approximate matching and machine learning to uncover malicious activity in logs46
FineGCP: Fine-grained dependency graph community partitioning for attack investigation46
VDSimilar: Vulnerability detection based on code similarity of vulnerabilities and patches46
A Methodology For Large-Scale Identification of Related Accounts in Underground Forums45
Personal CAPTCHA-based authentication protocol45
A classification-by-retrieval framework for few-shot anomaly detection to detect API injection45
An efficient two-stage pipeline model with filtering algorithm for mislabeled malware detection45
Erratum to ‘Ensemble transfer attack targeting text classification systems’ [Computers & Security 117 (2022) 1–8/ 102695]45
A hybrid deep learning framework for privacy preservation in edge computing44
“I don't get it, but I accept it” Exploring uninformed consent to privacy policies: A neutralization perspective44
An empirical study of vulnerability discovery methods over the past ten years44
Assessing the impact of packing on static machine learning-based malware detection and classification systems44
Biometric masterkeys44
Safeguarding connected autonomous vehicle communication: Protocols, intra- and inter-vehicular attacks and defenses43
A critical survey of the security and privacy aspects of the Aadhaar framework43
Integrating security in hazard analysis using STPA-Sec and GSPN: A case study of automatic emergency braking system43
BenchMFC: A benchmark dataset for trustworthy malware family classification under concept drift43
Navigating challenging terrain surrounding DoD response to homeland attacks on critical infrastructure: Case studies of prior incidents utilizing an extended taxonomy of cyber harms42
Perspectives of non-expert users on cyber security and privacy: An analysis of online discussions on twitter42
Add noise to remove noise: Local differential privacy for feature selection42
FE-DaST: Fast and effective data-free substitute training for black-box adversarial attacks42
XLMR4MD: New Vietnamese dataset and framework for detecting the consistency of description and permission in Android applications using large language models42
Extending the classical side-channel analysis framework to access-driven cache attacks42
A multi-source log semantic analysis-based attack investigation approach41
ML-based intrusion detection system for precise APT cyber-clustering41
Editorial Board41
VWA-6G AI assisted continuous security monitoring over open RAN service management orchestration40
Design, implementation, and automation of a risk management approach for man-at-the-End software protection40
GONE: A generic O(1) NoisE layer for protecting privacy of deep neural networ40
PIXHELL: When pixels learn to scream40
Model update for intrusion detection: Analyzing the performance of delayed labeling and active learning strategies40
Cyber security and the Leviathan40
Model-based structural and behavioral cybersecurity risk assessment in system designs40
Integrity coded databases - protecting data integrity for outsourced databases40
Object-free backdoor attack and defense on semantic segmentation40
TIMFuser: A multi-granular fusion framework for cyber threat intelligence39
Which algorithm can detect unknown attacks? Comparison of supervised, unsupervised and meta-learning algorithms for intrusion detection39
Information security policies compliance in a global setting: An employee's perspective39
Unawareness detection: Discovering black-box malicious models and quantifying privacy leakage risks39
Dealing with uncertainty in cybersecurity decision support39
Wavelet-based CSI reconstruction for improved wireless security through channel reciprocity39
Cookie disclaimers: Dark patterns and lack of transparency39
NTLFlowLyzer: Towards generating an intrusion detection dataset and intruders behavior profiling through network and transport layers traffic analysis and pattern extraction38
Detection and mitigation of vampire attacks with secure routing in WSN using weighted RNN and optimal path selection38
The applicability of a hybrid framework for automated phishing detection38
FLADEN: Federated Learning for Anomaly DEtection in IoT Networks38
ILL-IDS: An incremental lifetime learning IDS for VANETs38
A system to calculate Cyber Value-at-Risk38
Detecting command injection vulnerabilities in Linux-based embedded firmware with LLM-based taint analysis of library functions38
Multivocal literature review on zero-trust security implementation38
Improving the Transferability of Targeted Adversarial Examples by Style-Agnostic Attack37
AVX-TSCHA: Leaking information through AVX extensions in commercial processors37
Malbert: A novel pre-training method for malware detection37
Modelling language for cyber security incident handling for critical infrastructures37
Selective forwarding attack detection and network recovery mechanism based on cloud-edge cooperation in software-defined wireless sensor network37
Analysis of statistical properties of variables in log data for advanced anomaly detection in cyber security37
A sequential deep learning framework for a robust and resilient network intrusion detection system37
Vulnerability detection through machine learning-based fuzzing: A systematic review37
APT beaconing detection: A systematic review36
Adversarial training for deep learning-based cyberattack detection in IoT-based smart city applications36
Conditional entropy-based hybrid DDoS detection model for IoT networks36
ADFL: Defending backdoor attacks in federated learning via adversarial distillation36
Insights into security and privacy towards fog computing evolution36
A Comprehensive Survey of Recent Internet Measurement Techniques for Cyber Security36
A new DDoS attacks intrusion detection model based on deep learning for cybersecurity36
Who are querying for me? Measuring the dependency and centralization in recursive resolution35
DMSCTS: Dynamic measurement scheme for the containers-hybrid-deployment based on trusted subsystem35
FELACS: Federated learning with adaptive client selection for IoT DDoS attack detection35
Cancelable iris template based on slicing35
Adaptive sensor attack detection and defense framework for autonomous vehicles based on density35
A Proactive Approach to assess web application security through the integration of security tools in a Security Orchestration Platform35
SMCD: Privacy-preserving deep learning based malicious code detection35
Enhancing cybersecurity in cloud computing and WSNs: A hybrid IDS approach35
Chameleon: Optimized feature selection using particle swarm optimization and ensemble methods for network anomaly detection34
Defense against underwater spy-robots: A distributed anti-theft topology control mechanism for insecure UASN34
Ibn Sina: A patient privacy‐preserving authentication protocol in medical internet of things34
Governing cybersecurity from the boardroom: Challenges, drivers, and ways ahead34
Edge Implicit Weighting with graph transformers for robust intrusion detection in Internet of Things network34
Enhancing can security with ML-based IDS: Strategies and efficacies against adversarial attacks34
Privacy-centered authentication: A new framework and analysis34
Editorial Board34
Enhancing security and robustness of Cyphal on Controller Area Network in unmanned aerial vehicle environments33
User-centric security analysis of MitID: The Danish passwordless digital identity solution33
Ensuring secure interoperation of access control in a multidomain environment33
Binary code traceability of multigranularity information fusion from the perspective of software genes33
An adaptive fuzzing method based on transformer and protocol similarity mutation33
An optimized neural network for prediction of security threats on software testing33
Editorial Board33
Improving adversarial robustness through a curriculum-guided reliable distillation33
Corrigendum to ‘Research on Lightweight Anomaly Detection of Multimedia Traffic in Edge Computing’ Computer & Security, 111(2021) 10246333
Stock market reactions to favorable and unfavorable information security events: A systematic literature review32
CPID: Insider threat detection using profiling and cyber-persona identification32
A review on client-server attacks and defenses in federated learning32
Operations-informed incident response playbooks32
TTSAD: TCN-Transformer-SVDD Model for Anomaly Detection in air traffic ADS-B data32
SNDMI: Spyware network traffic detection method based on inducement operations32
Dynamic user-centric access control for detection of ransomware attacks32
GRAIN: Graph neural network and reinforcement learning aided causality discovery for multi-step attack scenario reconstruction32
Audio adversarial detection through classification score on speech recognition systems32
A privacy-preserving handover authentication protocol for a group of MTC devices in 5G networks32
AdvCheck: Characterizing adversarial examples via local gradient checking32
Optimized verifiable delegated private set intersection on outsourced private datasets32
Developing decision support for cybersecurity threat and incident managers31
A Survey Of differential privacy-based techniques and their applicability to location-Based services31
CNN based method for the development of cyber-attacks detection algorithms in industrial control systems31
A new deep boosted CNN and ensemble learning based IoT malware detection31
ZKSA: Secure mutual Attestation against TOCTOU Zero-knowledge Proof based for IoT Devices31
Synthetic attack data generation model applying generative adversarial network for intrusion detection31
An automated closed-loop framework to enforce security policies from anomaly detection31
Transformer-based framework for alert aggregation and attack prediction in a multi-stage attack31
Detection of anomalies of a non-deterministic software-defined networking control30
MUD-PQFed: Towards Malicious User Detection on model corruption in Privacy-preserving Quantized Federated learning30
An omnidirectional approach to touch-based continuous authentication30
Stacking ensemble-based HIDS framework for detecting anomalous system processes in Windows based operating systems using multiple word embedding30
Evaluating fallback authentication research: A systematic literature review30
IoT security: On-chip secure deletion scheme using ECC modulation in IoT appliances30
Editorial Board30
Reducing false positives in bank anti-fraud systems based on rule induction in distributed tree-based models30
A Novel Password Policy Focusing on Altering User Password Selection Habits: A Statistical Analysis on Breached Data30
A survey on the evolution of fileless attacks and detection techniques30
BD-MDLC: Behavior description-based enhanced malware detection for windows environment using longformer classifier29
A cognitive security framework for detecting intrusions in IoT and 5G utilizing deep learning29
Updating Windows malware detectors: Balancing robustness and regression against adversarial EXEmples29
Accountable, Scalable and DoS-resilient Secure Vehicular Communication29
A systematic survey on physical layer security oriented to reconfigurable intelligent surface empowered 6G29
Improving monolithic kernel security and robustness through intra-kernel sandboxing29
A privacy-aware authentication and usage-controlled access protocol for IIoT decentralized data marketplace29
Data reduction for black-box adversarial attacks against deep neural networks based on side-channel attacks29
RansoGuard: A RNN-based framework leveraging pre-attack sensitive APIs for early ransomware detection29
Fast and practical intrusion detection system based on federated learning for VANET29
"No point worrying" – The role of threat devaluation in information security behavior29
Privacy-preserving spatiotemporal trajectory generalization publishing scheme with differential privacy29
Modelling smart grid IT-OT dependencies for DDoS impact propagation29
STFT-TCAN: A TCN-attention based multivariate time series anomaly detection architecture with time-frequency analysis for cyber-industrial systems28
Time for De-cluttering: Digital clutter scaling for individuals and enterprises28
Hilbert signal envelope-based multi-features methods for GNSS spoofing detection28
FECC: DNS tunnel detection model based on CNN and clustering28
Gradient-based defense methods for data leakage in vertical federated learning28
Points of the local optimal privacy utility tradeoff28
VERTFuzz: Version transformer-driven fuzzing for complex file parsers28
SVulDetector: Vulnerability detection based on similarity using tree-based attention and weighted graph embedding mechanisms28
FS-IDS: A framework for intrusion detection based on few-shot learning28
A login page transparency and visual similarity-based zero-day phishing defense protocol28
Identifying information security opinion leaders in organizations: Insights from the theory of social power bases and social network analysis27
0.27737498283386