Computers & Security

Papers
(The H4-Index of Computers & Security is 49. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2020-11-01 to 2024-11-01.)
ArticleCitations
Cyber security in the age of COVID-19: A timeline and analysis of cyber-crime and cyber-attacks during the pandemic333
Cybersecurity for autonomous vehicles: Review of attacks and defense217
An effective intrusion detection approach using SVM with naïve Bayes feature embedding184
Privacy preservation in federated learning: An insightful survey from the GDPR perspective137
A systematic literature review of methods and datasets for anomaly-based network intrusion detection130
The internet of things security: A survey encompassing unexplored areas and new insights112
Resource allocation and trust computing for blockchain-enabled edge computing system108
Deep learning for insider threat detection: Review, challenges and opportunities107
A fast network intrusion detection system using adaptive synthetic oversampling and LightGBM106
Integration of blockchain and federated learning for Internet of Things: Recent advances and future challenges103
Never trust, always verify: A multivocal literature review on current knowledge and research gaps of zero-trust100
A blockchain-based scheme for privacy-preserving and secure sharing of medical data100
GDroid: Android malware detection and classification with graph convolutional network99
A zero-knowledge-proof-based digital identity management scheme in blockchain92
Ransomware: Recent advances, analysis, challenges and future research directions91
A survey on wireless body area networks: architecture, security challenges and research opportunities86
Enhancing employees information security awareness in private and public organisations: A systematic literature review86
A novel combinatorial optimization based feature selection method for network intrusion detection84
A survey on security attacks and defense techniques for connected and autonomous vehicles83
EfficientNet convolutional neural networks-based Android malware detection83
An effective genetic algorithm-based feature selection method for intrusion detection systems80
STL-HDL: A new hybrid network intrusion detection system for imbalanced dataset on big data environment79
A survey of empirical performance evaluation of permissioned blockchain platforms: Challenges and opportunities76
Developing cybersecurity culture to influence employee behavior: A practice perspective75
CSE-IDS: Using cost-sensitive deep learning and ensemble algorithms to handle class imbalance in network-based intrusion detection systems75
Intrusion detection methods based on integrated deep learning model74
Catch them alive: A malware detection approach through memory forensics, manifold learning and computer vision73
Integration of federated machine learning and blockchain for the provision of secure big data analytics for Internet of Things73
JOWMDroid: Android malware detection based on feature weighting with joint optimization of weight-mapping and classifier parameters70
A comprehensive study of DDoS attacks over IoT network and their countermeasures69
How can organizations develop situation awareness for incident response: A case study of management practice66
Applying machine learning and natural language processing to detect phishing email66
Towards an interpretable deep learning model for mobile malware detection and family identification64
A novel architecture for web-based attack detection using convolutional neural network63
Developing a cyber security culture: Current practices and future needs61
A systematic threat analysis and defense strategies for the metaverse and extended reality systems60
Recurrent neural network for detecting malware60
Machine learning for encrypted malicious traffic detection: Approaches, datasets and comparative study59
Optimized extreme learning machine for detecting DDoS attacks in cloud computing59
Authentication and Identity Management of IoHT Devices: Achievements, Challenges, and Future Directions59
A survey of machine learning techniques in adversarial image forensics57
Hardening machine learning denial of service (DoS) defences against adversarial attacks in IoT smart home networks57
Cloud computing security: A survey of service-based models56
Latest trends of security and privacy in recommender systems: A comprehensive review and future perspectives56
A new DDoS attacks intrusion detection model based on deep learning for cybersecurity55
KronoDroid: Time-based Hybrid-featured Dataset for Effective Android Malware Detection and Characterization51
Characterizing cryptocurrency exchange scams51
RNNIDS: Enhancing network intrusion detection systems through deep learning50
Cybercrime threat intelligence: A systematic multi-vocal literature review50
Information security governance challenges and critical success factors: Systematic review49
Assessing IoT enabled cyber-physical attack paths against critical systems49
Survey on smart homes: Vulnerabilities, risks, and countermeasures49
0.060965061187744