Computers & Security

Papers
(The H4-Index of Computers & Security is 56. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2021-05-01 to 2025-05-01.)
ArticleCitations
Navigating Cybersecurity Governance: The influence of opportunity structures in socio-technical transitions for small and medium enterprises372
Multivariate time series anomaly detection with variational autoencoder and spatial–temporal graph network190
Defend against adversarial attacks in malware detection through attack space management189
Reading is not believing: A multimodal adversarial attacker for Chinese-NLP model158
Editorial Board146
A novel Evil Twin MiTM attack through 802.11v protocol exploitation140
Towards a metrics suite for evaluating cache side-channel vulnerability: Case studies on an open-source RISC-V processor140
Reviewer Acknowledgement 2021134
A bio-inspired optimal feature with convolutional GhostNet based squeeze excited deep-scale capsule network for intrusion detection129
Exploring compiler optimization space for control flow obfuscation124
Vulnerabilities in Android webview objects: Still not the end!123
MADONNA: Browser-based malicious domain detection using Optimized Neural Network by leveraging AI and feature analysis119
RETRACTED: I recognize you by your steps: Privacy impact of pedometer data118
AttackNet: Enhancing biometric security via tailored convolutional neural network architectures for liveness detection113
Covert timing channel detection based on isolated binary trees110
A lightweight packet forwarding verification in SDN using sketch109
Analysis of human reliability in detecting GPS spoofing on ECDIS in congested waterways under evidential reasoning and HEART approach106
Improving transferable adversarial attack via feature-momentum101
An analysis of zero-trust architecture and its cost-effectiveness for organizational security98
A permission-carrying security policy and static enforcement for information flows in Android programs96
FineFool: A novel DNN object contour attack on image recognition based on the attention perturbation adversarial technique96
On Detecting and Classifying DGA Botnets and their Families92
PPT: A privacy-preserving global model training protocol for federated learning in P2P networks91
AutoVAS: An automated vulnerability analysis system with a deep learning approach89
Don’t get stung, cover your ICS in honey: How do honeypots fit within industrial control system security85
A typology of cybersecurity behavior among knowledge workers82
Investigating machine learning attacks on financial time series models78
TZMon: Improving mobile game security with ARM trustzone77
The moderating effect of abusive supervision on information security policy compliance: Evidence from the hospitality industry76
The effectiveness of zoom touchscreen gestures for authentication and identification and its changes over time75
A traffic anomaly detection scheme for non-directional denial of service attacks in software-defined optical network72
The Security Awareness Adventure: A serious game for security awareness training utilizing a state transition system and a probabilistic model71
Cybersecurity preparedness of small-to-medium businesses: A Western Australia study with broader implications71
Influencing the security prioritisation of an agile software development project68
Cloud computing security: A survey of service-based models68
MGA-IDS: Optimal feature subset selection for anomaly detection framework on in-vehicle networks-CAN bus based on genetic algorithm and intrusion detection approach68
Usable and secure? User perception of four authentication methods for mobile banking66
GCN-MHSA: A novel malicious traffic detection method based on graph convolutional neural network and multi-head self-attention mechanism62
AIDTF: Adversarial training framework for network intrusion detection62
Security First, Security by Design, or Security Pragmatism – Strategic Roles of IT Security in Digitalization Projects62
A systematic literature review on online assessment security: Current challenges and integrity strategies62
Learning from cyber security incidents: A systematic review and future research agenda62
Study on the latent state of Kaminsky-style DNS cache poisoning: Modeling and empirical analysis61
SENSE: An unsupervised semantic learning model for cross-platform vulnerability search61
Understanding the chief information security officer: Qualifications and responsibilities for cybersecurity leadership61
DeMal: Module decomposition of malware based on community discovery60
You are your friends: Detecting malware via guilt-by-association and exempt-by-reputation60
An improved ShapeShifter method of generating adversarial examples for physical attacks on stop signs against Faster R-CNNs60
An optimized differential privacy scheme with reinforcement learning in VANET59
Examining the inconsistent effect of privacy control on privacy concerns in e-commerce services: The moderating role of privacy experience and risk propensity58
Comparative evaluation of recent universal adversarial perturbations in image classification58
Improving adversarial transferability through hybrid augmentation58
BiTCN-TAEfficientNet malware classification approach based on sequence and RGB fusion58
On the Effectiveness of Ransomware Decryption Tools58
A multi-type vulnerability detection framework with parallel perspective fusion and hierarchical feature enhancement58
Fuzzing drones for anomaly detection: A systematic literature review57
0.12306904792786