Computers & Security

Papers
(The H4-Index of Computers & Security is 51. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2020-03-01 to 2024-03-01.)
ArticleCitations
Cyber security in the age of COVID-19: A timeline and analysis of cyber-crime and cyber-attacks during the pandemic276
Applications of blockchain in ensuring the security and privacy of electronic health record systems: A survey224
Image-Based malware classification using ensemble of CNN architectures (IMCEC)207
Building Auto-Encoder Intrusion Detection System based on random forest feature selection178
A deep learning method with wrapper based feature extraction for wireless intrusion detection system176
IoT malicious traffic identification using wrapper-based feature selection mechanisms161
Cybersecurity for autonomous vehicles: Review of attacks and defense157
An effective intrusion detection approach using SVM with naïve Bayes feature embedding143
Improving cyberbullying detection using Twitter users’ psychological features and machine learning130
SwiftIDS: Real-time intrusion detection system based on LightGBM and parallel intrusion detection mechanism101
A dynamic Windows malware detection and prediction method based on contextual understanding of API call sequence97
Resource allocation and trust computing for blockchain-enabled edge computing system95
Byte-level malware classification based on markov images and deep learning92
Privacy preservation in federated learning: An insightful survey from the GDPR perspective88
A systematic literature review of methods and datasets for anomaly-based network intrusion detection82
Deep learning for insider threat detection: Review, challenges and opportunities82
A blockchain-based scheme for privacy-preserving and secure sharing of medical data82
A fast network intrusion detection system using adaptive synthetic oversampling and LightGBM75
Defining organisational information security culture—Perspectives from academia and industry74
Integration of blockchain and federated learning for Internet of Things: Recent advances and future challenges74
GDroid: Android malware detection and classification with graph convolutional network74
The internet of things security: A survey encompassing unexplored areas and new insights73
A survey on methods and challenges in EEG based authentication72
A survey on wireless body area networks: architecture, security challenges and research opportunities70
AMalNet: A deep learning framework based on graph convolutional networks for malware detection70
A zero-knowledge-proof-based digital identity management scheme in blockchain69
A survey of empirical performance evaluation of permissioned blockchain platforms: Challenges and opportunities68
Riskio: A Serious Game for Cyber Security Awareness and Education66
Developing cybersecurity culture to influence employee behavior: A practice perspective66
APT datasets and attack modeling for automated detection methods: A review65
HYDRA: A multimodal deep learning framework for malware classification65
Detecting stealthy false data injection attacks in the smart grid using ensemble-based machine learning64
STL-HDL: A new hybrid network intrusion detection system for imbalanced dataset on big data environment64
Enhancing employees information security awareness in private and public organisations: A systematic literature review64
A one-class classification approach for bot detection on Twitter63
Ransomware: Recent advances, analysis, challenges and future research directions62
A novel combinatorial optimization based feature selection method for network intrusion detection61
An effective genetic algorithm-based feature selection method for intrusion detection systems61
Highly efficient federated learning with strong privacy preservation in cloud computing59
Never trust, always verify: A multivocal literature review on current knowledge and research gaps of zero-trust58
The Ransomware-as-a-Service economy within the darknet58
EfficientNet convolutional neural networks-based Android malware detection58
A novel architecture for web-based attack detection using convolutional neural network57
Catch them alive: A malware detection approach through memory forensics, manifold learning and computer vision56
Privacy Preserving Face Recognition Utilizing Differential Privacy56
A survey on security attacks and defense techniques for connected and autonomous vehicles56
Anomaly detection in Industrial Control Systems using Logical Analysis of Data55
Intrusion detection methods based on integrated deep learning model55
System log clustering approaches for cyber security applications: A survey54
TIMiner: Automatically extracting and analyzing categorized cyber threat intelligence from social data54
Integration of federated machine learning and blockchain for the provision of secure big data analytics for Internet of Things51
0.064792156219482