Computers & Security

Papers
(The TQCC of Computers & Security is 15. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2021-05-01 to 2025-05-01.)
ArticleCitations
Navigating Cybersecurity Governance: The influence of opportunity structures in socio-technical transitions for small and medium enterprises372
Multivariate time series anomaly detection with variational autoencoder and spatial–temporal graph network190
Defend against adversarial attacks in malware detection through attack space management189
Reading is not believing: A multimodal adversarial attacker for Chinese-NLP model158
Editorial Board146
Towards a metrics suite for evaluating cache side-channel vulnerability: Case studies on an open-source RISC-V processor140
A novel Evil Twin MiTM attack through 802.11v protocol exploitation140
Reviewer Acknowledgement 2021134
A bio-inspired optimal feature with convolutional GhostNet based squeeze excited deep-scale capsule network for intrusion detection129
Exploring compiler optimization space for control flow obfuscation124
Vulnerabilities in Android webview objects: Still not the end!123
MADONNA: Browser-based malicious domain detection using Optimized Neural Network by leveraging AI and feature analysis119
RETRACTED: I recognize you by your steps: Privacy impact of pedometer data118
AttackNet: Enhancing biometric security via tailored convolutional neural network architectures for liveness detection113
Covert timing channel detection based on isolated binary trees110
A lightweight packet forwarding verification in SDN using sketch109
Analysis of human reliability in detecting GPS spoofing on ECDIS in congested waterways under evidential reasoning and HEART approach106
Improving transferable adversarial attack via feature-momentum101
An analysis of zero-trust architecture and its cost-effectiveness for organizational security98
A permission-carrying security policy and static enforcement for information flows in Android programs96
FineFool: A novel DNN object contour attack on image recognition based on the attention perturbation adversarial technique96
On Detecting and Classifying DGA Botnets and their Families92
PPT: A privacy-preserving global model training protocol for federated learning in P2P networks91
AutoVAS: An automated vulnerability analysis system with a deep learning approach89
Don’t get stung, cover your ICS in honey: How do honeypots fit within industrial control system security85
A typology of cybersecurity behavior among knowledge workers82
Investigating machine learning attacks on financial time series models78
TZMon: Improving mobile game security with ARM trustzone77
The moderating effect of abusive supervision on information security policy compliance: Evidence from the hospitality industry76
The effectiveness of zoom touchscreen gestures for authentication and identification and its changes over time75
A traffic anomaly detection scheme for non-directional denial of service attacks in software-defined optical network72
Cybersecurity preparedness of small-to-medium businesses: A Western Australia study with broader implications71
The Security Awareness Adventure: A serious game for security awareness training utilizing a state transition system and a probabilistic model71
Cloud computing security: A survey of service-based models68
MGA-IDS: Optimal feature subset selection for anomaly detection framework on in-vehicle networks-CAN bus based on genetic algorithm and intrusion detection approach68
Influencing the security prioritisation of an agile software development project68
Usable and secure? User perception of four authentication methods for mobile banking66
Security First, Security by Design, or Security Pragmatism – Strategic Roles of IT Security in Digitalization Projects62
A systematic literature review on online assessment security: Current challenges and integrity strategies62
Learning from cyber security incidents: A systematic review and future research agenda62
GCN-MHSA: A novel malicious traffic detection method based on graph convolutional neural network and multi-head self-attention mechanism62
AIDTF: Adversarial training framework for network intrusion detection62
SENSE: An unsupervised semantic learning model for cross-platform vulnerability search61
Understanding the chief information security officer: Qualifications and responsibilities for cybersecurity leadership61
Study on the latent state of Kaminsky-style DNS cache poisoning: Modeling and empirical analysis61
You are your friends: Detecting malware via guilt-by-association and exempt-by-reputation60
An improved ShapeShifter method of generating adversarial examples for physical attacks on stop signs against Faster R-CNNs60
DeMal: Module decomposition of malware based on community discovery60
An optimized differential privacy scheme with reinforcement learning in VANET59
Improving adversarial transferability through hybrid augmentation58
BiTCN-TAEfficientNet malware classification approach based on sequence and RGB fusion58
On the Effectiveness of Ransomware Decryption Tools58
A multi-type vulnerability detection framework with parallel perspective fusion and hierarchical feature enhancement58
Examining the inconsistent effect of privacy control on privacy concerns in e-commerce services: The moderating role of privacy experience and risk propensity58
Comparative evaluation of recent universal adversarial perturbations in image classification58
Fuzzing drones for anomaly detection: A systematic literature review57
Towards bidirectional LUT-level detection of hardware Trojans55
White-box content camouflage attacks against deep learning55
Achieving flatness: Graph labeling can generate graphical honeywords55
Waste not: Using diverse neural networks from hyperparameter search for improved malware detection55
Improving transferability of adversarial examples by saliency distribution and data augmentation54
Would US citizens accept cybersecurity deresponsibilization? Perhaps not53
Formally verifying security protocols built on watermarking and jamming53
Adaptive edge security framework for dynamic IoT security policies in diverse environments52
Enhancing adversarial robustness for deep metric learning via neural discrete adversarial training52
The meta attack language - a formal description51
Web of shadows: Investigating malware abuse of internet services51
A Systematical and longitudinal study of evasive behaviors in windows malware51
TrojanProbe: Fingerprinting Trojan tunnel implementations by actively probing crafted HTTP requests51
Toward enhancing web privacy on HTTPS traffic: A novel SuperLearner attack model and an efficient defense approach with adversarial examples51
: A lightweight and efficient network topology obfuscation defense scheme51
IDPFilter: Mitigating interdependent privacy issues in third-party apps50
Multidimensional categorical data collection under shuffled differential privacy50
Multi-probability sampling-based detection of malicious switching nodes in SDN49
Beyond the sandbox: Leveraging symbolic execution for evasive malware classification49
Foggier skies, clearer clouds: A real-time IoT-DDoS attack mitigation framework in fog-assisted software-defined cyber-physical systems49
A comprehensive deep learning benchmark for IoT IDS49
RAIDS: Robust autoencoder-based intrusion detection system model against adversarial attacks49
An anomaly detection model for in-vehicle networks based on lightweight convolution with spectral residuals49
A survey on wireless body area networks: architecture, security challenges and research opportunities49
Cognitively reconfigurable mimic-based heterogeneous password recovery system49
Assessing information security culture: A mixed-methods approach to navigating challenges in international corporate IT departments47
PVFL: Verifiable federated learning and prediction with privacy-preserving47
HT2ML: An efficient hybrid framework for privacy-preserving Machine Learning using HE and TEE47
A large-scale analysis of the effectiveness of publicly reported security patches46
Cross-site scripting detection with two-channel feature fusion embedded in self-attention mechanism46
Smart homes under siege: Assessing the robustness of physical security against wireless network attacks46
Clustered federated learning architecture for network anomaly detection in large scale heterogeneous IoT networks46
KPointer: Keep the code pointers on the stack point to the right code45
A Privacy-Preserving Framework for Endorsement Process in Hyperledger Fabric45
A Differentially private hybrid decomposition algorithm based on quad-tree44
Tamp-X: Attacking explainable natural language classifiers through tampered activations44
Extended right-angle difference ternary co-relation pattern: A new feature descriptor for face anti-spoofing44
KronoDroid: Time-based Hybrid-featured Dataset for Effective Android Malware Detection and Characterization43
Android malware detection via an app similarity graph43
Neuronal Jamming cyberattack over invasive BCIs affecting the resolution of tasks requiring visual capabilities43
When expectation fails and motivation prevails: the mediating role of awareness in bridging the expectancy-capability gap in mobile identity protection43
NERO: NEural algorithmic reasoning for zeRO-day attack detection in the IoT: A hybrid approach43
Digestive neural networks: A novel defense strategy against inference attacks in federated learning43
Erratum to ‘Ensemble transfer attack targeting text classification systems’ [Computers & Security 117 (2022) 1–8/ 102695]42
VDSimilar: Vulnerability detection based on code similarity of vulnerabilities and patches42
An adversarial learning framework with cross-domain loss for median filtered image restoration and anti-forensics42
Modelling language for cyber security incident handling for critical infrastructures42
Endpoint security reinforcement via integrated zero-trust systems: A collaborative approach42
GAIL-PT: An intelligent penetration testing framework with generative adversarial imitation learning42
Forecasting cyber security threats landscape and associated technical trends in telehealth using Bidirectional Encoder Representations from Transformers (BERT)42
Safeguarding connected autonomous vehicle communication: Protocols, intra- and inter-vehicular attacks and defenses41
A Comprehensive Survey of Recent Internet Measurement Techniques for Cyber Security41
Detecting command injection vulnerabilities in Linux-based embedded firmware with LLM-based taint analysis of library functions41
APT beaconing detection: A systematic review41
A Methodology For Large-Scale Identification of Related Accounts in Underground Forums41
Using approximate matching and machine learning to uncover malicious activity in logs41
FineGCP: Fine-grained dependency graph community partitioning for attack investigation41
The applicability of a hybrid framework for automated phishing detection41
Avaddon ransomware: An in-depth analysis and decryption of infected systems40
Add noise to remove noise: Local differential privacy for feature selection40
FE-DaST: Fast and effective data-free substitute training for black-box adversarial attacks40
GONE: A generic O(1) NoisE layer for protecting privacy of deep neural networ40
NTLFlowLyzer: Towards generating an intrusion detection dataset and intruders behavior profiling through network and transport layers traffic analysis and pattern extraction39
Malbert: A novel pre-training method for malware detection39
Information security policies compliance in a global setting: An employee's perspective39
Cyber security and the Leviathan39
A critical survey of the security and privacy aspects of the Aadhaar framework39
Vulnerability detection through machine learning-based fuzzing: A systematic review39
A sequential deep learning framework for a robust and resilient network intrusion detection system38
Multivocal literature review on zero-trust security implementation38
Insights into security and privacy towards fog computing evolution38
n-HTLC: Neo hashed time-Lock commitment to defend against wormhole attack in payment channel netwo38
XLMR4MD: New Vietnamese dataset and framework for detecting the consistency of description and permission in Android applications using large language models37
Integrating security in hazard analysis using STPA-Sec and GSPN: A case study of automatic emergency braking system37
A classification-by-retrieval framework for few-shot anomaly detection to detect API injection37
Personal CAPTCHA-based authentication protocol37
Redefining threat appraisals of organizational insiders and exploring the moderating role of fear in cyberattack protection motivation37
Extending the classical side-channel analysis framework to access-driven cache attacks37
Object-free backdoor attack and defense on semantic segmentation37
A hybrid deep learning framework for privacy preservation in edge computing36
Biometric masterkeys36
An efficient two-stage pipeline model with filtering algorithm for mislabeled malware detection36
AVX-TSCHA: Leaking information through AVX extensions in commercial processors36
Integrity coded databases - protecting data integrity for outsourced databases36
An empirical study of vulnerability discovery methods over the past ten years35
Dealing with uncertainty in cybersecurity decision support35
Conditional entropy-based hybrid DDoS detection model for IoT networks35
ML-based intrusion detection system for precise APT cyber-clustering35
A system to calculate Cyber Value-at-Risk35
Adversarial training for deep learning-based cyberattack detection in IoT-based smart city applications35
Editorial Board34
Navigating challenging terrain surrounding DoD response to homeland attacks on critical infrastructure: Case studies of prior incidents utilizing an extended taxonomy of cyber harms34
TIMFuser: A multi-granular fusion framework for cyber threat intelligence34
A multi-source log semantic analysis-based attack investigation approach34
Detection and mitigation of vampire attacks with secure routing in WSN using weighted RNN and optimal path selection33
Unawareness detection: Discovering black-box malicious models and quantifying privacy leakage risks33
Perspectives of non-expert users on cyber security and privacy: An analysis of online discussions on twitter33
Analysis of statistical properties of variables in log data for advanced anomaly detection in cyber security33
Hardening machine learning denial of service (DoS) defences against adversarial attacks in IoT smart home networks33
Design, implementation, and automation of a risk management approach for man-at-the-End software protection33
Model update for intrusion detection: Analyzing the performance of delayed labeling and active learning strategies32
BenchMFC: A benchmark dataset for trustworthy malware family classification under concept drift32
Selective forwarding attack detection and network recovery mechanism based on cloud-edge cooperation in software-defined wireless sensor network32
ADFL: Defending backdoor attacks in federated learning via adversarial distillation32
Cookie disclaimers: Dark patterns and lack of transparency32
A new DDoS attacks intrusion detection model based on deep learning for cybersecurity32
ILL-IDS: An incremental lifetime learning IDS for VANETs32
A privacy-preserving handover authentication protocol for a group of MTC devices in 5G networks31
Which algorithm can detect unknown attacks? Comparison of supervised, unsupervised and meta-learning algorithms for intrusion detection31
Binary code traceability of multigranularity information fusion from the perspective of software genes31
Enhancing security and robustness of Cyphal on Controller Area Network in unmanned aerial vehicle environments31
Adaptive sensor attack detection and defense framework for autonomous vehicles based on density31
Dynamic user-centric access control for detection of ransomware attacks31
DMSCTS: Dynamic measurement scheme for the containers-hybrid-deployment based on trusted subsystem31
User-centric security analysis of MitID: The Danish passwordless digital identity solution30
Editorial Board30
Privacy-centered authentication: A new framework and analysis30
AdvCheck: Characterizing adversarial examples via local gradient checking30
Editorial Board30
SMCD: Privacy-preserving deep learning based malicious code detection29
GRAIN: Graph neural network and reinforcement learning aided causality discovery for multi-step attack scenario reconstruction29
Corrigendum to ‘Research on Lightweight Anomaly Detection of Multimedia Traffic in Edge Computing’ Computer & Security, 111(2021) 10246329
Ensuring secure interoperation of access control in a multidomain environment29
Edge Implicit Weighting with graph transformers for robust intrusion detection in Internet of Things network29
Ibn Sina: A patient privacy‐preserving authentication protocol in medical internet of things29
An automated closed-loop framework to enforce security policies from anomaly detection29
Improving adversarial robustness through a curriculum-guided reliable distillation29
JSContana: Malicious JavaScript detection using adaptable context analysis and key feature extraction28
An adaptive fuzzing method based on transformer and protocol similarity mutation28
Data integrity auditing for secure cloud storage using user behavior prediction28
A robust privacy preserving approach for electronic health records using multiple dataset with multiple sensitive attributes28
Optimized verifiable delegated private set intersection on outsourced private datasets28
SNDMI: Spyware network traffic detection method based on inducement operations28
CPID: Insider threat detection using profiling and cyber-persona identification28
Cancelable iris template based on slicing28
Audio adversarial detection through classification score on speech recognition systems28
Stock market reactions to favorable and unfavorable information security events: A systematic literature review28
A Proactive Approach to assess web application security through the integration of security tools in a Security Orchestration Platform28
Operations-informed incident response playbooks27
Indicators for maturity and readiness for digital forensic investigation in era of industrial revolution 4.027
TTSAD: TCN-Transformer-SVDD Model for Anomaly Detection in air traffic ADS-B data27
A new deep boosted CNN and ensemble learning based IoT malware detection27
Enhancing can security with ML-based IDS: Strategies and efficacies against adversarial attacks27
Maladaptive behaviour in response to email phishing threats: The roles of rewards and response costs27
A Survey Of differential privacy-based techniques and their applicability to location-Based services27
Chameleon: Optimized feature selection using particle swarm optimization and ensemble methods for network anomaly detection27
A security type verifier for smart contracts27
An optimized neural network for prediction of security threats on software testing27
Defense against underwater spy-robots: A distributed anti-theft topology control mechanism for insecure UASN27
A review on client-server attacks and defenses in federated learning27
Synthetic attack data generation model applying generative adversarial network for intrusion detection27
CNN based method for the development of cyber-attacks detection algorithms in industrial control systems27
Developing decision support for cybersecurity threat and incident managers27
Enhancing cybersecurity in cloud computing and WSNs: A hybrid IDS approach26
Editorial Board26
ZKSA: Secure mutual Attestation against TOCTOU Zero-knowledge Proof based for IoT Devices26
Evaluating fallback authentication research: A systematic literature review26
A privacy-aware authentication and usage-controlled access protocol for IIoT decentralized data marketplace26
IoT security: On-chip secure deletion scheme using ECC modulation in IoT appliances26
"No point worrying" – The role of threat devaluation in information security behavior26
SVulDetector: Vulnerability detection based on similarity using tree-based attention and weighted graph embedding mechanisms26
CDDA-MD: An efficient malicious traffic detection method based on concept drift detection and adaptation technique26
Ensemble transfer attack targeting text classification systems26
Detection of anomalies of a non-deterministic software-defined networking control26
Governing cybersecurity from the boardroom: Challenges, drivers, and ways ahead26
A survey on the evolution of fileless attacks and detection techniques26
A Field-Sensitive Security Monitor for Object-Oriented Programs26
Weighted distributed differential privacy ERM: Convex and non-convex26
A Novel Password Policy Focusing on Altering User Password Selection Habits: A Statistical Analysis on Breached Data26
Improving monolithic kernel security and robustness through intra-kernel sandboxing26
Stacking ensemble-based HIDS framework for detecting anomalous system processes in Windows based operating systems using multiple word embedding25
Reducing false positives in bank anti-fraud systems based on rule induction in distributed tree-based models25
A lightweight deep learning framework for botnet detecting at the IoT edge25
Network intrusion detection based on n-gram frequency and time-aware transformer25
BD-MDLC: Behavior description-based enhanced malware detection for windows environment using longformer classifier25
VulGAI: vulnerability detection based on graphs and images25
DeepStream: Autoencoder-based stream temporal clustering and anomaly detection25
Genetic programming for enhanced detection of Advanced Persistent Threats through feature construction25
GSEDroid: GNN-based Android malware detection framework using lightweight semantic embedding25
Transformer-based framework for alert aggregation and attack prediction in a multi-stage attack25
Know your enemy: Conversational agents for security, education, training, and awareness at scale24
A systematic survey on physical layer security oriented to reconfigurable intelligent surface empowered 6G24
BinVulDet: Detecting vulnerability in binary program via decompiled pseudo code and BiLSTM-attention24
Statistical machine learning defensive mechanism against cyber intrusion in smart grid cyber-physical network24
Unveiling encrypted traffic types through hierarchical network characteristics24
Extending limited datasets with GAN-like self-supervision for SMS spam detection24
MUD-PQFed: Towards Malicious User Detection on model corruption in Privacy-preserving Quantized Federated learning24
Survivable zero trust for cloud computing environments24
A cognitive security framework for detecting intrusions in IoT and 5G utilizing deep learning24
Time for De-cluttering: Digital clutter scaling for individuals and enterprises24
RansoGuard: A RNN-based framework leveraging pre-attack sensitive APIs for early ransomware detection24
Hilbert signal envelope-based multi-features methods for GNSS spoofing detection24
Examining the privacy paradox through individuals’ neural disposition in e-commerce: An exploratory neuroimaging study24
Agriculture 4.0 and beyond: Evaluating cyber threat intelligence sources and techniques in smart farming ecosystems23
0.16594505310059