ACM Transactions on Privacy and Security

Papers
(The median citation count of ACM Transactions on Privacy and Security is 2. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2020-04-01 to 2024-04-01.)
ArticleCitations
Adversarial EXEmples60
Proactively Identifying Emerging Hacker Threats from the Dark Web44
On Generating Network Traffic Datasets with Synthetic Attacks for Intrusion Detection33
Key Negotiation Downgrade Attacks on Bluetooth and Bluetooth Low Energy25
An Extensive Formal Analysis of Multi-factor Authentication Protocols20
MOTION – A Framework for Mixed-Protocol Multi-Party Computation18
The Android Platform Security Model18
Maat17
Assessing Cyber Risk in Cyber-Physical Systems Using the ATT&CK Framework15
Privacy-Preserving Decision Trees Training and Prediction15
Design, Development, and Evaluation of a Cybersecurity, Privacy, and Digital Literacy Game for Tweens15
Dealing with Security Alert Flooding: Using Machine Learning for Domain-independent Alert Aggregation14
A Deep Dive Inside DREBIN: An Explorative Analysis beyond Android Malware Detection Scores14
Attack Context Embedded Data Driven Trust Diagnostics in Smart Metering Infrastructure12
Using Generative Adversarial Networks to Break and Protect Text Captchas12
NoiSense Print12
Quantum Leap and Crash12
Flexible Mechanisms for Remote Attestation11
Euler : Detecting Network Lateral Movement via Scalable Temporal Link Prediction11
Privacy-preserving Dynamic Symmetric Searchable Encryption with Controllable Leakage11
Analyzing Dynamic Code11
Following Passive DNS Traces to Detect Stealthy Malicious Domains Via Graph Inference11
A Systematic Analysis of the Capital One Data Breach: Critical Lessons Learned10
Efficient Authorization of Graph-database Queries in an Attribute-supporting ReBAC Model9
A Large-Scale Analysis of the Semantic Password Model and Linguistic Patterns in Passwords9
The Seven Deadly Sins of the HTML5 WebAPI9
Pump Up Password Security! Evaluating and Enhancing Risk-Based Authentication on a Real-World Large-Scale Online Service8
Friendly Fire8
FENCE: Feasible Evasion Attacks on Neural Networks in Constrained Environments8
Generating Quality Threat Intelligence Leveraging OSINT and a Cyber Threat Unified Taxonomy8
Build It, Break It, Fix It8
Vulnerabilities of Unattended Face Verification Systems to Facial Components-based Presentation Attacks: An Empirical Study8
Exploitation Techniques for Data-oriented Attacks with Existing and Potential Defense Approaches8
Optimal Packet Camouflage Against Traffic Analysis8
SoK: A Modularized Approach to Study the Security of Automatic Speech Recognition Systems7
The System That Cried Wolf7
Hidden in Plain Sight: Exploring Privacy Risks of Mobile Augmented Reality Applications7
Adaptive Cyber Defense Against Multi-Stage Attacks Using Learning-Based POMDP7
On the Security and Usability Implications of Providing Multiple Authentication Choices on Smartphones7
Privado6
Formal Analysis of Mobile Multi-Factor Authentication with Single Sign-On Login6
On the Security of Smartphone Unlock PINs6
Systematic Mutation-Based Evaluation of the Soundness of Security-Focused Android Static Analysis Techniques6
A Novel Hybrid Approach for Multi-Dimensional Data Anonymization for Apache Spark6
A Lightweight Privacy-Aware Continuous Authentication Protocol-PACA6
Exploiting Mixed Binaries5
One Size Does Not Fit All5
“So if Mr Blue Head here clicks the link...” Risk Thinking in Cyber Security Decision Making5
Risk Prediction of IoT Devices Based on Vulnerability Analysis5
Privacy Policies across the Ages: Content of Privacy Policies 1996–20215
Two-factor Password-authenticated Key Exchange with End-to-end Security5
Security Best Practices: A Critical Analysis Using IoT as a Case Study4
Designing Strong Privacy Metrics Suites Using Evolutionary Optimization4
Large-scale and Robust Code Authorship Identification with Deep Feature Learning4
AutoProfile: Towards Automated Profile Generation for Memory Analysis4
SoK: Human-centered Phishing Susceptibility4
Industrial Control Systems Security via Runtime Enforcement4
RansomShield: A Visualization Approach to Defending Mobile Systems Against Ransomware4
InkFiltration: Using Inkjet Printers for Acoustic Data Exfiltration from Air-Gapped Networks3
A Vulnerability Assessment Framework for Privacy-preserving Record Linkage3
A Multi-view Approach to Preserve Privacy and Utility in Network Trace Anonymization3
VulANalyzeR: Explainable Binary Vulnerability Detection with Multi-task Learning and Attentional Graph Convolution3
Dynamic Binary Translation for SGX Enclaves3
ThermoSecure: Investigating the Effectiveness of AI-Driven Thermal Attacks on Commonly Used Computer Keyboards3
Binsec/Rel: Symbolic Binary Analyzer for Security with Applications to Constant-Time and Secret-Erasure3
A Solicitous Approach to Smart Contract Verification3
Accountable Private Set Cardinality for Distributed Measurement2
Contact Discovery in Mobile Messengers: Low-cost Attacks, Quantitative Analyses, and Efficient Mitigations2
Differentially Private Real-Time Release of Sequential Data2
#PrettyFlyForAWiFi2
So Near and Yet So Far – Symbolic Verification of Distance-Bounding Protocols2
Learning Relationship-Based Access Control Policies from Black-Box Systems2
EI-MTD: Moving Target Defense for Edge Intelligence against Adversarial Attacks2
PRShare: A Framework for Privacy-preserving, Interorganizational Data Sharing2
Stateful Protocol Composition in Isabelle/HOL2
What Users Want From Cloud Deletion and the Information They Need: A Participatory Action Study2
Valued Authorization Policy Existence Problem: Theory and Experiments2
Formal Modelling and Automated Trade-off Analysis of Enforcement Architectures for Cryptographic Access Control in the Cloud2
Privacy-preserving Decentralized Federated Learning over Time-varying Communication Graph2
A Study on the Use of Checksums for Integrity Verification of Web Downloads2
HotFuzz: Discovering Temporal and Spatial Denial-of-Service Vulnerabilities Through Guided Micro-Fuzzing2
Performance and Usability Evaluation of Brainwave Authentication Techniques with Consumer Devices2
0.038995027542114