Computers & Security

Papers
(The H4-Index of Computers & Security is 65. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2022-05-01 to 2026-05-01.)
ArticleCitations
Editorial Board307
VeracOS: An operating system extension for the veracity of files215
Editorial Board158
Reading is not believing: A multimodal adversarial attacker for Chinese-NLP model155
DynamicFuzz: Confidence-based directed greybox fuzzing for programs with unreliable call graphs141
Evaluating cyber attacks on central banks – identification of trends in cyber threat landscape134
FiPiBox:Development of firewall for IoT networks using P4Pi133
Cybersecurity preparedness of small-to-medium businesses: A Western Australia study with broader implications132
Influencing the security prioritisation of an agile software development project128
Defend against adversarial attacks in malware detection through attack space management126
GCN-MHSA: A novel malicious traffic detection method based on graph convolutional neural network and multi-head self-attention mechanism125
An analysis of zero-trust architecture and its cost-effectiveness for organizational security123
RETRACTED: I recognize you by your steps: Privacy impact of pedometer data121
PPT: A privacy-preserving global model training protocol for federated learning in P2P networks120
A permission-carrying security policy and static enforcement for information flows in Android programs120
Wasserstein distance guided feature Tokenizer transformer domain adaptation for network intrusion detection115
Investigating machine learning attacks on financial time series models114
BotPro: Data-driven tracking & profiling of IoT botnets in the wild110
The Reverse File System: Towards open cost-effective secure WORM storage devices for logging109
The Security Awareness Adventure: A serious game for security awareness training utilizing a state transition system and a probabilistic model107
Analysis of human reliability in detecting GPS spoofing on ECDIS in congested waterways under evidential reasoning and HEART approach107
Enhancing intrusion detection in containerized services: Assessing machine learning models and an advanced representation for system call data102
Navigating Cybersecurity Governance: The influence of opportunity structures in socio-technical transitions for small and medium enterprises100
AttackNet: Enhancing biometric security via tailored convolutional neural network architectures for liveness detection100
MADONNA: Browser-based malicious domain detection using Optimized Neural Network by leveraging AI and feature analysis97
A lightweight packet forwarding verification in SDN using sketch93
Improving transferable adversarial attack via feature-momentum93
Cybersecurity optimization in supply chains under propagated cyberattacks93
Security First, Security by Design, or Security Pragmatism – Strategic Roles of IT Security in Digitalization Projects92
Exploring compiler optimization space for control flow obfuscation92
Towards a metrics suite for evaluating cache side-channel vulnerability: Case studies on an open-source RISC-V processor92
A novel Evil Twin MiTM attack through 802.11v protocol exploitation89
Covert timing channel detection based on isolated binary trees89
Enhancing encrypted traffic analysis via source APIs: A robust approach for malicious traffic detection88
A typology of cybersecurity behavior among knowledge workers87
A bio-inspired optimal feature with convolutional GhostNet based squeeze excited deep-scale capsule network for intrusion detection87
Learning from cyber security incidents: A systematic review and future research agenda86
Multivariate time series anomaly detection with variational autoencoder and spatial–temporal graph network82
MGA-IDS: Optimal feature subset selection for anomaly detection framework on in-vehicle networks-CAN bus based on genetic algorithm and intrusion detection approach82
AIDTF: Adversarial training framework for network intrusion detection82
TrojanProbe: Fingerprinting Trojan tunnel implementations by actively probing crafted HTTP requests79
Exploring capacitive swipe gesture for user authentication using a new large dataset79
An anomaly detection model for in-vehicle networks based on lightweight convolution with spectral residuals78
A multi-type vulnerability detection framework with parallel perspective fusion and hierarchical feature enhancement77
New results on modeling and hybrid control for malware propagation in cyber–physical systems77
IDPFilter: Mitigating interdependent privacy issues in third-party apps75
Beyond the sandbox: Leveraging symbolic execution for evasive malware classification75
Multidimensional categorical data collection under shuffled differential privacy75
Multi-probability sampling-based detection of malicious switching nodes in SDN73
Detecting DBMS bugs with context-sensitive instantiation and multi-plan execution73
The Practice of Cyber-Threat Intelligence in Organizations: A Socio-Technical Case Study of a Mature Financial Organization72
Web of shadows: Investigating malware abuse of internet services72
The meta attack language - a formal description71
Understanding the chief information security officer: Qualifications and responsibilities for cybersecurity leadership70
NERO: NEural algorithmic reasoning for zeRO-day attack detection in the IoT: A hybrid approach69
Cognitively reconfigurable mimic-based heterogeneous password recovery system69
PVFL: Verifiable federated learning and prediction with privacy-preserving69
Examining the inconsistent effect of privacy control on privacy concerns in e-commerce services: The moderating role of privacy experience and risk propensity67
Insecure by design? A human-centric security perspective on AI-assisted software development67
Comparative evaluation of recent universal adversarial perturbations in image classification67
KPointer: Keep the code pointers on the stack point to the right code66
Assessing information security culture: A mixed-methods approach to navigating challenges in international corporate IT departments66
Would US citizens accept cybersecurity deresponsibilization? Perhaps not65
A large-scale analysis of the effectiveness of publicly reported security patches65
Forecasting cyber security threats landscape and associated technical trends in telehealth using Bidirectional Encoder Representations from Transformers (BERT)65
0.26764297485352