Computers & Security

Papers
(The TQCC of Computers & Security is 11. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2021-02-01 to 2025-02-01.)
ArticleCitations
Editorial Board348
HyperGo: Probability-based directed hybrid fuzzing240
Navigating Cybersecurity Governance: The influence of opportunity structures in socio-technical transitions for small and medium enterprises184
Multivariate time series anomaly detection with variational autoencoder and spatial–temporal graph network137
Towards a cybersecurity culture-behaviour framework: A rapid evidence review130
Detecting interest flooding attacks in NDN: A probability-based event-driven approach120
E-WebGuard: Enhanced neural architectures for precision web attack detection120
SecureQwen: Leveraging LLMs for vulnerability detection in python codebases116
PDSMV3-DCRNN: A novel ensemble deep learning framework for enhancing phishing detection and URL extraction116
Thread-sensitive fuzzing for concurrency bug detection111
Zero day ransomware detection with Pulse: Function classification with Transformer models and assembly language108
An innovative practical roadmap for optimal control strategies in malware propagation through the integration of RL with MPC106
RAF-AG: Report analysis framework for attack path generation101
Enhancing data integrity in opportunistic mobile social network: Leveraging Berkle Tree and secure data routing against attacks99
A hybrid scoring system for prioritization of software vulnerabilities86
Detect malicious websites by building a neural network to capture global and local features of websites84
LEGO: A hybrid toolkit for efficient 2PC-based privacy-preserving machine learning83
Container security: Precaution levels, mitigation strategies, and research perspectives83
A principlist framework for cybersecurity ethics81
A model-based approach for vulnerability analysis of IoT security protocols: The Z-Wave case study80
Countering ARP spoofing attacks in software-defined networks using a game-theoretic approach78
Off-policy actor-critic deep reinforcement learning methods for alert prioritization in intrusion detection systems76
Using alternate reality games to find a needle in a haystack: An approach for testing insider threat detection methods75
Network-based multidimensional moving target defense against false data injection attack in power system74
Fault-tolerant security-efficiency combined authentication scheme for manned-unmanned teaming73
MAG-PUFs: Authenticating IoT devices via electromagnetic physical unclonable functions and deep learning71
The mediating role of security anxiety in internet threat avoidance behavior66
Optimism amid risk: How non-IT employees’ beliefs affect cybersecurity behavior65
Cybersecurity communities of practice: Strategies for creating gateways to participation65
COVER: Enhancing virtualization obfuscation through dynamic scheduling using flash controller-based secure module61
FUZZOLIC: Mixing fuzzing and concolic execution59
HAformer: Semantic fusion of hex machine code and assembly code for cross-architecture binary vulnerability detection59
Automated machine learning for deep learning based malware detection59
AntiViruses under the microscope: A hands-on perspective58
Machine learning-based early detection of IoT botnets using network-edge traffic58
Wasmati: An efficient static vulnerability scanner for WebAssembly57
Evaluation of Asian Countries using Data Center Security Index: A Spherical Fuzzy AHP-based EDAS Approach56
PDHF: Effective phishing detection model combining optimal artificial and automatic deep features55
Reading is not believing: A multimodal adversarial attacker for Chinese-NLP model51
IoTSecSim: A framework for modelling and simulation of security in Internet of things51
A comparative evaluation of behavioral security motives: Protection, intrinsic, and identity motivations50
Defend against adversarial attacks in malware detection through attack space management50
AIS-NIDS: An intelligent and self-sustaining network intrusion detection system49
Complex yet attainable? An interdisciplinary approach to designing better cyber range exercises49
Fuzzing JavaScript engines with a syntax-aware neural program model49
FDT: Improving the transferability of adversarial examples with frequency domain transformation48
A novel biometric authentication scheme with privacy protection based on SVM and ZKP47
Adaptive and maladaptive factors behind password manager use: A hope-extended protection motivation perspective47
Reducing fraud in organizations through information security policy compliance: An information security controls perspective47
A lightweight packet forwarding verification in SDN using sketch47
Detecting abnormal logins by discovering anomalous links via graph transformers46
An Android Malware Detection and Classification Approach Based on Contrastive Lerning46
A novel dual cloud server privacy-preserving scheme in spatial crowdsourcing46
Lightweight Sybil Attack Detection in IoT based on Bloom Filter and Physical Unclonable Function45
An empirical analysis of the information security culture key factors framework45
Security and privacy problems in voice assistant applications: A survey45
AttackNet: Enhancing biometric security via tailored convolutional neural network architectures for liveness detection44
A longitudinal study on improving employee information protective knowledge and behaviors44
Correlated differential privacy based logistic regression for supplier data protection43
A privacy preservation method for multiple-source unstructured data in online social networks43
MONDEO-Tactics5G: Multistage botnet detection and tactics for 5G/6G networks43
Empirically evaluating the effect of security precautions on cyber incidents43
Cross-domain vulnerability detection using graph embedding and domain adaptation43
A traffic anomaly detection scheme for non-directional denial of service attacks in software-defined optical network42
Efficient handover protocol for 5G and beyond networks42
A security awareness and competency evaluation in the energy sector41
An efficient approach for taint analysis of android applications41
Universal location referencing and homomorphic evaluation of geospatial query40
FineFool: A novel DNN object contour attack on image recognition based on the attention perturbation adversarial technique40
“Get a red-hot poker and open up my eyes, it's so boring”1: Employee perceptions of cybersecurity training40
Your Behaviors Reveal What You Need: A Practical Scheme Based on User Behaviors for Personalized Security Nudges39
Balancing software and training requirements for information security39
Detection of malicious PE files using synthesized DNA artifacts39
SABDTM: Security-first architecture-based dynamic trusted measurement scheme for operating system of the virtual computing node39
Editorial Board38
FedSIGN: A sign-based federated learning framework with privacy and robustness guarantees38
PhishHunter: Detecting camouflaged IDN-based phishing attacks via Siamese neural network38
Towards a metrics suite for evaluating cache side-channel vulnerability: Case studies on an open-source RISC-V processor38
Editorial Board37
Towards efficient Secure Boolean Range Query over encrypted spatial data37
A novel Evil Twin MiTM attack through 802.11v protocol exploitation37
GAMBD: Generating adversarial malware against MalConv37
Editorial Board36
Single-board device individual authentication based on hardware performance and autoencoder transformer models36
Threat classification model for security information event management focusing on model efficiency36
Observational equivalence and security games: Enhancing the formal analysis of security protocols36
Editorial Board36
Beyond robustness: Resilience verification of tree-based classifiers36
FACILE: A capsule network with fewer capsules and richer hierarchical information for malware image classification36
Editorial Board35
Transferable adversarial examples can efficiently fool topic models35
Privacy-preserving correlation of cross-organizational cyber threat intelligence with private graph intersections35
Behavioral embedding for continuous user verification in global settings35
Web-tracking compliance: websites’ level of confidence in the use of information-gathering technologies35
Distance-based linkage of personal microbiome records for identification and its privacy implications34
Intrusion detection method based on improved social network search algorithm34
The cybersecurity risk estimation engine: A tool for possibility based risk analysis34
Design and implementation of an efficient container tag dynamic taint analysis34
A PUF-based secure wake-up scheme for Internet of Things33
Three-classification face manipulation detection using attention-based feature decomposition33
An application specific dynamic behaviour model using function-call sequence and memory access-graph for execution integrity verification32
DNS tunnelling detection by fusing encoding feature and behavioral feature32
Editorial Board32
CLTracer: A Cross-Ledger Tracing framework based on address relationships32
Cyber-physical attack graphs (CPAGs): Composable and scalable attack graphs for cyber-physical systems32
SecChecker: Inspecting the security implementation of 5G Commercial Off-The-Shelf (COTS) mobile devices32
Balancing anonymity and resilience in anonymous communication networks32
Stability analysis and optimal control of worm propagation model with saturated incidence rate31
Editorial Board31
A personalized trajectory privacy protection method31
A Two-Step TLS-Based Browser fingerprinting approach using combinatorial sequences30
Editorial Board30
An approach for predicting multiple-type overflow vulnerabilities based on combination features and a time series neural network algorithm30
Dynamic face authentication systems: Deep learning verification for camera close-Up and head rotation paradigms30
Reviewer Acknowledgement 202130
A permission-carrying security policy and static enforcement for information flows in Android programs30
SCFL: Mitigating backdoor attacks in federated learning based on SVD and clustering30
Enimanal: Augmented cross-architecture IoT malware analysis using graph neural networks29
Flexible software protection29
Security in microservice-based systems: A Multivocal literature review29
Editorial Board29
Thwarting code-reuse and side-channel attacks in embedded systems29
Detecting malicious reviews and users affecting social reviewing systems: A survey29
Anomalous distributed traffic: Detecting cyber security attacks amongst microservices using graph convolutional networks29
A secure routing scheme to mitigate attack in wireless adhoc sensor network29
Cloud computing security: A survey of service-based models28
Fuzzing vulnerability discovery techniques: Survey, challenges and future directions28
Enforcement of separation of duty constraints in attribute-based access control28
Longitudinal risk-based security assessment of docker software container images28
Microscopic printing analysis and application for classification of source printer28
APLDP: Adaptive personalized local differential privacy data collection in mobile crowdsensing28
Don’t get stung, cover your ICS in honey: How do honeypots fit within industrial control system security28
Advancing IoT security with flame: A hybrid approach combining fuzzy logic and artificial lizard search optimization27
An enhanced handover authentication solution for 6LoWPAN networks27
An active learning framework using deep Q-network for zero-day attack detection27
Secured lightweight authentication for 6LoWPANs in machine-to-machine communications27
Improving transferable adversarial attack via feature-momentum27
#Segments: A Dominant Factor of Password Security to Resist against Data-driven Guessing27
TZMon: Improving mobile game security with ARM trustzone27
A few-shot malware classification approach for unknown family recognition using malware feature visualization26
SKT-IDS: Unknown attack detection method based on Sigmoid Kernel Transformation and encoder–decoder architecture26
Enhancing employees information security awareness in private and public organisations: A systematic literature review26
Differentially private GANs by adding noise to Discriminator’s loss26
VehicleLang: A probabilistic modeling and simulation language for modern vehicle IT infrastructures26
Multimodal-based abnormal behavior detection method in virtualization environment26
Towards a conceptual definition for IT assets through interrogating their nature and epistemic uncertainty25
Investigating machine learning attacks on financial time series models25
A threshold traceable delegation authorization scheme for data sharing in healthcare25
Influencing the security prioritisation of an agile software development project25
Access control in Internet of Things: A survey25
Wasm-Mutate: Fast and effective binary diversification for WebAssembly25
Pre-processing memory dumps to improve similarity score of Windows modules25
SoK: Run-time security for cloud microservices. Are we there yet?25
EvilModel 2.0: Bringing Neural Network Models into Malware Attacks25
Exploring compiler optimization space for control flow obfuscation25
Vulnerabilities in Android webview objects: Still not the end!24
EnsembleFool: A method to generate adversarial examples based on model fusion strategy24
Information security policy non-compliance: Can capitulation theory explain user behaviors?24
SG-PAC: A stochastic game approach to generate personal privacy paradox access-control policies in social networks24
Rethinking maximum-margin softmax for adversarial robustness24
Privacy-preserving certificateless public auditing supporting different auditing frequencies24
A systematic review of current cybersecurity training methods24
A typology of cybersecurity behavior among knowledge workers24
A survey on the (in)security of trusted execution environments23
An ensemble of pre-trained transformer models for imbalanced multiclass malware classification23
WebAssembly diversification for malware evasion23
Examining usable security features and user perceptions of Physical Authentication Devices23
Differential area analysis for ransomware attack detection within mixed file datasets23
Semi-supervised log anomaly detection based on bidirectional temporal convolution network23
Extreme minority class detection in imbalanced data for network intrusion23
A novel cryptosystem based on DNA cryptography and randomly generated mealy machine23
IoT security certifications: Challenges and potential approaches23
Revealing the realities of cybercrime in small and medium enterprises: Understanding fear and taxonomic perspectives23
Differentially private graph publishing with degree distribution preservation22
The effectiveness of zoom touchscreen gestures for authentication and identification and its changes over time22
An intelligent multi-layer framework with SHAP integration for botnet detection and classification22
Dynamic multi-scale topological representation for enhancing network intrusion detection22
CTI-SOC2M2 – The quest for mature, intelligence-driven security operations and incident response capabilities22
Moving towards agile cybersecurity incident response: A case study exploring the enabling role of big data analytics-embedded dynamic capabilities22
Domain adaptation for Windows advanced persistent threat detection22
Enhancing robustness of person detection: A universal defense filter against adversarial patch attacks22
Vulnerability impact analysis in software project dependencies based on Satisfiability Modulo Theories (SMT)22
Malware detection on windows audit logs using LSTMs21
Data privacy and cybersecurity challenges in the digital transformation of the banking sector21
JStrong: Malicious JavaScript detection based on code semantic representation and graph neural network21
AIDTF: Adversarial training framework for network intrusion detection21
Serious games as a tool to model attack and defense scenarios for cyber-security exercises21
GCN-MHSA: A novel malicious traffic detection method based on graph convolutional neural network and multi-head self-attention mechanism21
Editorial Board21
The moderating effect of abusive supervision on information security policy compliance: Evidence from the hospitality industry21
Editorial21
Edge intelligence secure frameworks: Current state and future challenges21
GUIDE: GAN-based UAV IDS Enhancement21
Designing accurate lightweight intrusion detection systems for IoT networks using fine-tuned linear SVM and feature selectors21
A comprehensive survey on cyber deception techniques to improve honeypot performance21
On Android’s activity hijacking prevention21
Rise of the Metaverse’s Immersive Virtual Reality Malware and the Man-in-the-Room Attack & Defenses21
Protecting your business against ransomware attacks? Explaining the motivations of entrepreneurs to take future protective measures against cybercrimes using an extended protection motivation theory m20
A critical review of the techniques used for anomaly detection of HTTP-based attacks: taxonomy, limitations and open challenges20
Machine learning-based jamming attack classification and effective defense technique20
Usable and secure? User perception of four authentication methods for mobile banking20
Robust deep learning early alarm prediction model based on the behavioural smell for android malware20
A hybrid method for analysis and detection of malicious executables in IoT network20
Wdt-SCAN: Clustering decentralized social graphs with local differential privacy20
Flooding attack mitigator for in-vehicle CAN using fault confinement in CAN protocol20
An empirical evaluation of the effectiveness of attack graphs and MITRE ATT&CK matrices in aiding cyber attack perception amongst decision-makers20
PeerRemove: An adaptive node removal strategy for P2P botnet based on deep reinforcement learning20
Unsupervised malicious domain detection with less labeling effort20
Intrusion detection methods based on integrated deep learning model20
Zero trust cybersecurity: Critical success factors and A maturity assessment framework20
Efficient and Robust Malware Detection Based on Control Flow Traces Using Deep Neural Networks19
LCDA: Lightweight Continuous Device-to-Device Authentication for a Zero Trust Architecture (ZTA)19
Exploring eustress and fear: A new perspective on protection motivation in information security policy compliance within the financial sector19
AutoVAS: An automated vulnerability analysis system with a deep learning approach19
A GPU-based machine learning approach for detection of botnet attacks19
On Detecting and Classifying DGA Botnets and their Families19
MGA-IDS: Optimal feature subset selection for anomaly detection framework on in-vehicle networks-CAN bus based on genetic algorithm and intrusion detection approach19
A novel model watermarking for protecting generative adversarial network19
Learning from cyber security incidents: A systematic review and future research agenda19
Machine Learning Modeling of GPS Features with Applications to UAV Location Spoofing Detection and Classification19
Deep learning for insider threat detection: Review, challenges and opportunities19
An analysis of zero-trust architecture and its cost-effectiveness for organizational security19
AdStop: Efficient flow-based mobile adware detection using machine learning19
Security First, Security by Design, or Security Pragmatism – Strategic Roles of IT Security in Digitalization Projects19
A systematic literature review on online assessment security: Current challenges and integrity strategies19
Cyber-threat intelligence for security decision-making: A review and research agenda for practice19
Challenges and pitfalls in malware research19
Deep secure PalmNet: A novel cancelable palmprint template protection scheme with deep attention net and randomized hashing security mechanism18
MaDroid: A maliciousness-aware multifeatured dataset for detecting android malware18
Birds of a feather: Collective privacy of online social activist groups18
One4All: Manipulate one agent to poison the cooperative multi-agent reinforcement learning18
Multivariate time series anomaly detection by fusion of deep convolution residual autoencoding reconstruction model and ConvLstm forecasting model18
Robust biometric scheme against replay attacks using one-time biometric templates18
GC-NLDP: A graph clustering algorithm with local differential privacy18
Corrigendum to “Expanding the Gordon-Loeb model to cyber-insurance” [Computers & Security Volume 112 (2022) 102533]18
PPT: A privacy-preserving global model training protocol for federated learning in P2P networks18
Industrial cyber-physical systems protection: A methodological review18
RSSI-based attacks for identification of BLE devices18
Association between stress and information security policy non-compliance behavior: A meta-analysis18
GhostEncoder: Stealthy backdoor attacks with dynamic triggers to pre-trained encoders in self-supervised learning17
Walking under the ladder logic: PLC-VBS: a PLC control logic vulnerability scanning tool17
How memory anxiety can influence password security behavior17
The role of national cybersecurity strategies on the improvement of cybersecurity education17
Image-based malware classification using section distribution information17
Probabilistic modelling of deception-based security framework using markov decision process17
Taking 5 minutes protects you for 5 months: Evaluating an anti-phishing awareness video17
ID-based sanitizable signature data integrity auditing scheme with privacy-preserving17
Using contextual factors to predict information security overconfidence: A machine learning approach17
A systematic literature review of methods and datasets for anomaly-based network intrusion detection17
Phishing websites detection via CNN and multi-head self-attention on imbalanced datasets17
0.096577167510986