Computers & Security

Papers
(The H4-Index of Computers & Security is 61. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2022-01-01 to 2026-01-01.)
ArticleCitations
Editorial Board272
Defend against adversarial attacks in malware detection through attack space management205
VeracOS: An operating system extension for the veracity of files191
Exploring compiler optimization space for control flow obfuscation133
Reviewer Acknowledgement 2021131
Towards a metrics suite for evaluating cache side-channel vulnerability: Case studies on an open-source RISC-V processor128
Editorial Board123
Reading is not believing: A multimodal adversarial attacker for Chinese-NLP model119
The Security Awareness Adventure: A serious game for security awareness training utilizing a state transition system and a probabilistic model112
RETRACTED: I recognize you by your steps: Privacy impact of pedometer data112
Security First, Security by Design, or Security Pragmatism – Strategic Roles of IT Security in Digitalization Projects111
Investigating machine learning attacks on financial time series models111
MGA-IDS: Optimal feature subset selection for anomaly detection framework on in-vehicle networks-CAN bus based on genetic algorithm and intrusion detection approach109
A permission-carrying security policy and static enforcement for information flows in Android programs108
A lightweight packet forwarding verification in SDN using sketch103
Enhancing encrypted traffic analysis via source APIs: A robust approach for malicious traffic detection103
A traffic anomaly detection scheme for non-directional denial of service attacks in software-defined optical network101
Covert timing channel detection based on isolated binary trees101
FiPiBox:Development of firewall for IoT networks using P4Pi101
Wasserstein distance guided feature Tokenizer transformer domain adaptation for network intrusion detection96
Navigating Cybersecurity Governance: The influence of opportunity structures in socio-technical transitions for small and medium enterprises95
AttackNet: Enhancing biometric security via tailored convolutional neural network architectures for liveness detection92
Don’t get stung, cover your ICS in honey: How do honeypots fit within industrial control system security91
DynamicFuzz: Confidence-based directed greybox fuzzing for programs with unreliable call graphs91
Improving transferable adversarial attack via feature-momentum90
Evaluating cyber attacks on central banks – identification of trends in cyber threat landscape90
GCN-MHSA: A novel malicious traffic detection method based on graph convolutional neural network and multi-head self-attention mechanism88
Enhancing intrusion detection in containerized services: Assessing machine learning models and an advanced representation for system call data86
Analysis of human reliability in detecting GPS spoofing on ECDIS in congested waterways under evidential reasoning and HEART approach86
AIDTF: Adversarial training framework for network intrusion detection83
An analysis of zero-trust architecture and its cost-effectiveness for organizational security83
On Detecting and Classifying DGA Botnets and their Families82
Influencing the security prioritisation of an agile software development project81
MADONNA: Browser-based malicious domain detection using Optimized Neural Network by leveraging AI and feature analysis80
PPT: A privacy-preserving global model training protocol for federated learning in P2P networks78
Multivariate time series anomaly detection with variational autoencoder and spatial–temporal graph network76
A novel Evil Twin MiTM attack through 802.11v protocol exploitation76
A typology of cybersecurity behavior among knowledge workers76
Cybersecurity preparedness of small-to-medium businesses: A Western Australia study with broader implications76
A bio-inspired optimal feature with convolutional GhostNet based squeeze excited deep-scale capsule network for intrusion detection74
Cloud computing security: A survey of service-based models73
Usable and secure? User perception of four authentication methods for mobile banking73
Learning from cyber security incidents: A systematic review and future research agenda72
Exploring capacitive swipe gesture for user authentication using a new large dataset71
A systematic literature review on online assessment security: Current challenges and integrity strategies71
A large-scale analysis of the effectiveness of publicly reported security patches70
Privacy-preserving distributed clustering: A fully homomorphic encrypted approach for time series69
TrojanProbe: Fingerprinting Trojan tunnel implementations by actively probing crafted HTTP requests68
Detecting DBMS bugs with context-sensitive instantiation and multi-plan execution68
Multi-probability sampling-based detection of malicious switching nodes in SDN67
BiTCN-TAEfficientNet malware classification approach based on sequence and RGB fusion66
Understanding the chief information security officer: Qualifications and responsibilities for cybersecurity leadership65
Improving transferability of adversarial examples by saliency distribution and data augmentation65
When expectation fails and motivation prevails: the mediating role of awareness in bridging the expectancy-capability gap in mobile identity protection65
Multidimensional categorical data collection under shuffled differential privacy64
Would US citizens accept cybersecurity deresponsibilization? Perhaps not64
A Privacy-Preserving Framework for Endorsement Process in Hyperledger Fabric64
NERO: NEural algorithmic reasoning for zeRO-day attack detection in the IoT: A hybrid approach63
Tamp-X: Attacking explainable natural language classifiers through tampered activations62
Cross-site scripting detection with two-channel feature fusion embedded in self-attention mechanism62
KPointer: Keep the code pointers on the stack point to the right code62
New results on modeling and hybrid control for malware propagation in cyber–physical systems61
Attack smarter: Attention-driven fine-grained webpage fingerprinting attacks61
You are your friends: Detecting malware via guilt-by-association and exempt-by-reputation61
A multi-type vulnerability detection framework with parallel perspective fusion and hierarchical feature enhancement61
0.21795201301575