Computers & Security

Papers
(The TQCC of Computers & Security is 14. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2021-04-01 to 2025-04-01.)
ArticleCitations
Editorial Board366
Navigating Cybersecurity Governance: The influence of opportunity structures in socio-technical transitions for small and medium enterprises261
Multivariate time series anomaly detection with variational autoencoder and spatial–temporal graph network219
A classifications framework for continuous biometric authentication (2018–2024)182
How do mental models affect cybersecurity awareness? The roles of questioning styles, need for cognition, and graphical representations179
Privacy and security of wearable internet of things: A scoping review and conceptual framework development for safety and health management in construction150
E-WebGuard: Enhanced neural architectures for precision web attack detection138
Detecting interest flooding attacks in NDN: A probability-based event-driven approach135
RAF-AG: Report analysis framework for attack path generation134
Enhancing data integrity in opportunistic mobile social network: Leveraging Berkle Tree and secure data routing against attacks130
A hybrid scoring system for prioritization of software vulnerabilities126
Container security: Precaution levels, mitigation strategies, and research perspectives124
How to decrypt files encrypted by Rhysida ransomware without the attacker’s private key118
SCASS: Breaking into SCADA Systems Security113
Analysis of human reliability in detecting GPS spoofing on ECDIS in congested waterways under evidential reasoning and HEART approach112
A review of privacy-preserving biometric identification and authentication protocols110
A model-based approach for vulnerability analysis of IoT security protocols: The Z-Wave case study107
Design and implementation of a closed loop time delay feedback control (CLTD-FC) system for mitigating DDos attacks106
Editorial104
MAG-PUFs: Authenticating IoT devices via electromagnetic physical unclonable functions and deep learning98
The mediating role of security anxiety in internet threat avoidance behavior97
Optimism amid risk: How non-IT employees’ beliefs affect cybersecurity behavior94
Evaluation framework for quantum security risk assessment: A comprehensive strategy for quantum-safe transition91
Enhancing user identification through batch averaging of independent window subsequences using smartphone and wearable data85
A bio-inspired optimal feature with convolutional GhostNet based squeeze excited deep-scale capsule network for intrusion detection85
A privacy preservation method for multiple-source unstructured data in online social networks84
Efficient handover protocol for 5G and beyond networks83
Information security policy non-compliance: Can capitulation theory explain user behaviors?82
Examining usable security features and user perceptions of Physical Authentication Devices81
A novel cryptosystem based on DNA cryptography and randomly generated mealy machine74
Differential area analysis for ransomware attack detection within mixed file datasets72
IoT security certifications: Challenges and potential approaches71
Reading is not believing: A multimodal adversarial attacker for Chinese-NLP model69
IoTSecSim: A framework for modelling and simulation of security in Internet of things68
AIS-NIDS: An intelligent and self-sustaining network intrusion detection system68
Defend against adversarial attacks in malware detection through attack space management68
Adaptive and maladaptive factors behind password manager use: A hope-extended protection motivation perspective67
A lightweight packet forwarding verification in SDN using sketch67
Detecting abnormal logins by discovering anomalous links via graph transformers61
Reducing fraud in organizations through information security policy compliance: An information security controls perspective61
An empirical analysis of the information security culture key factors framework61
Towards a cybersecurity culture-behaviour framework: A rapid evidence review60
An ensemble of pre-trained transformer models for imbalanced multiclass malware classification60
Machine learning-based early detection of IoT botnets using network-edge traffic59
MaDroid: A maliciousness-aware multifeatured dataset for detecting android malware59
Domain adaptation for Windows advanced persistent threat detection59
A GPU-based machine learning approach for detection of botnet attacks59
Editorial Board58
Designing accurate lightweight intrusion detection systems for IoT networks using fine-tuned linear SVM and feature selectors58
A novel framework to identify cybersecurity challenges and opportunities for organizational digital transformation in the cloud58
HAE-HRL: A network intrusion detection system utilizing a novel autoencoder and a hybrid enhanced LSTM-CNN-based residual network57
Editorial Board57
Towards a metrics suite for evaluating cache side-channel vulnerability: Case studies on an open-source RISC-V processor57
A novel Evil Twin MiTM attack through 802.11v protocol exploitation56
Editorial Board55
GAMBD: Generating adversarial malware against MalConv55
Observational equivalence and security games: Enhancing the formal analysis of security protocols55
Editorial Board55
Beyond robustness: Resilience verification of tree-based classifiers55
Single-board device individual authentication based on hardware performance and autoencoder transformer models54
FACILE: A capsule network with fewer capsules and richer hierarchical information for malware image classification53
Editorial Board53
Web-tracking compliance: websites’ level of confidence in the use of information-gathering technologies52
Transferable adversarial examples can efficiently fool topic models51
Behavioral embedding for continuous user verification in global settings51
Editorial Board51
DNS tunnelling detection by fusing encoding feature and behavioral feature50
Editorial Board50
A PUF-based secure wake-up scheme for Internet of Things50
An application specific dynamic behaviour model using function-call sequence and memory access-graph for execution integrity verification49
Editorial Board49
LeakFocus: Catching the perpetrator in routing leak event48
Editorial Board48
A personalized trajectory privacy protection method48
Editorial Board48
Reviewer Acknowledgement 202148
Dynamic face authentication systems: Deep learning verification for camera close-Up and head rotation paradigms48
A Two-Step TLS-Based Browser fingerprinting approach using combinatorial sequences48
On Android’s activity hijacking prevention47
Robust deep learning early alarm prediction model based on the behavioural smell for android malware47
Malware detection on windows audit logs using LSTMs47
An empirical evaluation of the effectiveness of attack graphs and MITRE ATT&CK matrices in aiding cyber attack perception amongst decision-makers47
Mitigating security stress: Exploring the contingent role of collaborative communication in enhancing information security compliance47
A secure routing scheme to mitigate attack in wireless adhoc sensor network46
Detecting malicious reviews and users affecting social reviewing systems: A survey46
APLDP: Adaptive personalized local differential privacy data collection in mobile crowdsensing46
A critical review of the techniques used for anomaly detection of HTTP-based attacks: taxonomy, limitations and open challenges46
Enforcement of separation of duty constraints in attribute-based access control46
Longitudinal risk-based security assessment of docker software container images45
Microscopic printing analysis and application for classification of source printer44
Don’t get stung, cover your ICS in honey: How do honeypots fit within industrial control system security44
Fuzzing vulnerability discovery techniques: Survey, challenges and future directions44
An active learning framework using deep Q-network for zero-day attack detection43
An enhanced handover authentication solution for 6LoWPAN networks43
TZMon: Improving mobile game security with ARM trustzone43
A permission-carrying security policy and static enforcement for information flows in Android programs42
Towards a conceptual definition for IT assets through interrogating their nature and epistemic uncertainty42
Advancing IoT security with flame: A hybrid approach combining fuzzy logic and artificial lizard search optimization42
Multimodal-based abnormal behavior detection method in virtualization environment42
Enhancing intrusion detection in containerized services: Assessing machine learning models and an advanced representation for system call data42
A few-shot malware classification approach for unknown family recognition using malware feature visualization42
A threshold traceable delegation authorization scheme for data sharing in healthcare41
EvilModel 2.0: Bringing Neural Network Models into Malware Attacks41
Exploring compiler optimization space for control flow obfuscation41
Investigating machine learning attacks on financial time series models41
Wasm-Mutate: Fast and effective binary diversification for WebAssembly41
Rethinking maximum-margin softmax for adversarial robustness40
Vulnerabilities in Android webview objects: Still not the end!40
A typology of cybersecurity behavior among knowledge workers40
A traffic anomaly detection scheme for non-directional denial of service attacks in software-defined optical network39
Anomalous distributed traffic: Detecting cyber security attacks amongst microservices using graph convolutional networks39
Wasmati: An efficient static vulnerability scanner for WebAssembly39
Efficient and Robust Malware Detection Based on Control Flow Traces Using Deep Neural Networks38
SoK: Run-time security for cloud microservices. Are we there yet?38
Flexible software protection38
Wdt-SCAN: Clustering decentralized social graphs with local differential privacy38
Detection of Cache Pollution Attack Based on Federated Learning in Ultra-Dense Network38
Flooding attack mitigator for in-vehicle CAN using fault confinement in CAN protocol38
Cross-domain vulnerability detection using graph embedding and domain adaptation37
Privacy-preserving certificateless public auditing supporting different auditing frequencies37
Threat classification model for security information event management focusing on model efficiency37
Your Behaviors Reveal What You Need: A Practical Scheme Based on User Behaviors for Personalized Security Nudges37
Three-classification face manipulation detection using attention-based feature decomposition37
#Segments: A Dominant Factor of Password Security to Resist against Data-driven Guessing37
GC-NLDP: A graph clustering algorithm with local differential privacy37
A comparative evaluation of behavioral security motives: Protection, intrinsic, and identity motivations36
Enimanal: Augmented cross-architecture IoT malware analysis using graph neural networks36
Stability analysis and optimal control of worm propagation model with saturated incidence rate36
WebAssembly diversification for malware evasion36
Cyber-physical attack graphs (CPAGs): Composable and scalable attack graphs for cyber-physical systems36
Empirically evaluating the effect of security precautions on cyber incidents36
RSSI-based attacks for identification of BLE devices35
Fuzzing JavaScript engines with a syntax-aware neural program model35
Complex yet attainable? An interdisciplinary approach to designing better cyber range exercises35
A novel biometric authentication scheme with privacy protection based on SVM and ZKP35
COVER: Enhancing virtualization obfuscation through dynamic scheduling using flash controller-based secure module35
Detection of malicious PE files using synthesized DNA artifacts35
HAformer: Semantic fusion of hex machine code and assembly code for cross-architecture binary vulnerability detection34
An innovative practical roadmap for optimal control strategies in malware propagation through the integration of RL with MPC34
A reliability anomaly detection method based on enhanced GRU-Autoencoder for Vehicular Fog Computing services34
Enhancing information security through brainprint: A longitudinal study on ERP identity authentication34
Fuzzing trusted execution environments with Rust34
Thread-sensitive fuzzing for concurrency bug detection34
Covert timing channel detection based on isolated binary trees34
Challenges and pitfalls in malware research33
Fault-tolerant security-efficiency combined authentication scheme for manned-unmanned teaming33
Network-based multidimensional moving target defense against false data injection attack in power system33
Using alternate reality games to find a needle in a haystack: An approach for testing insider threat detection methods33
On providing multi-level security assurance based on Common Criteria for O-RAN mobile network equipment. A test case: O-RAN Distributed Unit33
Design and implementation of an efficient container tag dynamic taint analysis32
Distance-based linkage of personal microbiome records for identification and its privacy implications32
Correlated differential privacy based logistic regression for supplier data protection32
Privacy-preserving correlation of cross-organizational cyber threat intelligence with private graph intersections32
SABDTM: Security-first architecture-based dynamic trusted measurement scheme for operating system of the virtual computing node32
Multivariate time series anomaly detection by fusion of deep convolution residual autoencoding reconstruction model and ConvLstm forecasting model32
PDHF: Effective phishing detection model combining optimal artificial and automatic deep features32
Towards efficient Secure Boolean Range Query over encrypted spatial data32
Intrusion detection method based on improved social network search algorithm31
The moderating effect of abusive supervision on information security policy compliance: Evidence from the hospitality industry31
A novel dual cloud server privacy-preserving scheme in spatial crowdsourcing31
Semi-supervised log anomaly detection based on bidirectional temporal convolution network31
“Get a red-hot poker and open up my eyes, it's so boring”1: Employee perceptions of cybersecurity training31
PhishHunter: Detecting camouflaged IDN-based phishing attacks via Siamese neural network31
AttackNet: Enhancing biometric security via tailored convolutional neural network architectures for liveness detection31
HyperGo: Probability-based directed hybrid fuzzing31
Differentially private graph publishing with degree distribution preservation30
EnsembleFool: A method to generate adversarial examples based on model fusion strategy30
AntiViruses under the microscope: A hands-on perspective30
SecChecker: Inspecting the security implementation of 5G Commercial Off-The-Shelf (COTS) mobile devices29
Balancing software and training requirements for information security29
Vulnerability impact analysis in software project dependencies based on Satisfiability Modulo Theories (SMT)29
CLTracer: A Cross-Ledger Tracing framework based on address relationships29
Enhancing employees information security awareness in private and public organisations: A systematic literature review29
An approach for predicting multiple-type overflow vulnerabilities based on combination features and a time series neural network algorithm29
Enhancing robustness of person detection: A universal defense filter against adversarial patch attacks29
Machine learning-based jamming attack classification and effective defense technique28
Editorial Board28
Zero trust cybersecurity: Critical success factors and A maturity assessment framework28
The effectiveness of zoom touchscreen gestures for authentication and identification and its changes over time28
MGA-IDS: Optimal feature subset selection for anomaly detection framework on in-vehicle networks-CAN bus based on genetic algorithm and intrusion detection approach28
A hybrid method for analysis and detection of malicious executables in IoT network28
AdStop: Efficient flow-based mobile adware detection using machine learning27
Deep secure PalmNet: A novel cancelable palmprint template protection scheme with deep attention net and randomized hashing security mechanism27
Association between stress and information security policy non-compliance behavior: A meta-analysis27
Security First, Security by Design, or Security Pragmatism – Strategic Roles of IT Security in Digitalization Projects27
Exploring eustress and fear: A new perspective on protection motivation in information security policy compliance within the financial sector27
Robust biometric scheme against replay attacks using one-time biometric templates27
A systematic literature review on online assessment security: Current challenges and integrity strategies27
Corrigendum to “Expanding the Gordon-Loeb model to cyber-insurance” [Computers & Security Volume 112 (2022) 102533]27
Cybersecurity preparedness of small-to-medium businesses: A Western Australia study with broader implications26
Learning from cyber security incidents: A systematic review and future research agenda26
Protecting your business against ransomware attacks? Explaining the motivations of entrepreneurs to take future protective measures against cybercrimes using an extended protection motivation theory m26
Cloud computing security: A survey of service-based models26
On Detecting and Classifying DGA Botnets and their Families26
One4All: Manipulate one agent to poison the cooperative multi-agent reinforcement learning26
Rise of the Metaverse’s Immersive Virtual Reality Malware and the Man-in-the-Room Attack & Defenses26
A principlist framework for cybersecurity ethics26
GCN-MHSA: A novel malicious traffic detection method based on graph convolutional neural network and multi-head self-attention mechanism26
RETRACTED: I recognize you by your steps: Privacy impact of pedometer data26
JStrong: Malicious JavaScript detection based on code semantic representation and graph neural network26
Off-policy actor-critic deep reinforcement learning methods for alert prioritization in intrusion detection systems26
PeerRemove: An adaptive node removal strategy for P2P botnet based on deep reinforcement learning26
PDSMV3-DCRNN: A novel ensemble deep learning framework for enhancing phishing detection and URL extraction25
Unsupervised malicious domain detection with less labeling effort25
MONDEO-Tactics5G: Multistage botnet detection and tactics for 5G/6G networks25
Extreme minority class detection in imbalanced data for network intrusion25
Revealing the realities of cybercrime in small and medium enterprises: Understanding fear and taxonomic perspectives25
Moving towards agile cybersecurity incident response: A case study exploring the enabling role of big data analytics-embedded dynamic capabilities25
Machine Learning Modeling of GPS Features with Applications to UAV Location Spoofing Detection and Classification25
Thwarting code-reuse and side-channel attacks in embedded systems25
A security awareness and competency evaluation in the energy sector24
PPT: A privacy-preserving global model training protocol for federated learning in P2P networks24
FDT: Improving the transferability of adversarial examples with frequency domain transformation24
Detect malicious websites by building a neural network to capture global and local features of websites24
LEGO: A hybrid toolkit for efficient 2PC-based privacy-preserving machine learning24
Birds of a feather: Collective privacy of online social activist groups24
Dynamic multi-scale topological representation for enhancing network intrusion detection24
Influencing the security prioritisation of an agile software development project24
Probabilistic modelling of deception-based security framework using markov decision process24
An efficient approach for taint analysis of android applications24
Industrial cyber-physical systems protection: A methodological review24
GUIDE: GAN-based UAV IDS Enhancement23
Countering ARP spoofing attacks in software-defined networks using a game-theoretic approach23
A novel model watermarking for protecting generative adversarial network23
Intrusion detection methods based on integrated deep learning model23
Automated machine learning for deep learning based malware detection23
An Android Malware Detection and Classification Approach Based on Contrastive Lerning23
Secured lightweight authentication for 6LoWPANs in machine-to-machine communications23
FLAD: Adaptive Federated Learning for DDoS attack detection23
Security and privacy problems in voice assistant applications: A survey23
Security in microservice-based systems: A Multivocal literature review23
An intelligent multi-layer framework with SHAP integration for botnet detection and classification23
Lightweight Sybil Attack Detection in IoT based on Bloom Filter and Physical Unclonable Function23
Cybersecurity communities of practice: Strategies for creating gateways to participation23
SKT-IDS: Unknown attack detection method based on Sigmoid Kernel Transformation and encoder–decoder architecture23
Evaluation of Asian Countries using Data Center Security Index: A Spherical Fuzzy AHP-based EDAS Approach23
Deep learning for insider threat detection: Review, challenges and opportunities22
SCFL: Mitigating backdoor attacks in federated learning based on SVD and clustering22
Edge intelligence secure frameworks: Current state and future challenges22
FUZZOLIC: Mixing fuzzing and concolic execution22
VehicleLang: A probabilistic modeling and simulation language for modern vehicle IT infrastructures22
An analysis of zero-trust architecture and its cost-effectiveness for organizational security22
Improving transferable adversarial attack via feature-momentum22
The cybersecurity risk estimation engine: A tool for possibility based risk analysis22
Cybersecurity in smart agriculture: A systematic literature review22
FineFool: A novel DNN object contour attack on image recognition based on the attention perturbation adversarial technique22
Cyber-threat intelligence for security decision-making: A review and research agenda for practice22
FedSIGN: A sign-based federated learning framework with privacy and robustness guarantees22
A comprehensive survey on cyber deception techniques to improve honeypot performance22
Zero day ransomware detection with Pulse: Function classification with Transformer models and assembly language22
0.096484184265137