ACM Transactions on Privacy and Security

Papers
(The TQCC of ACM Transactions on Privacy and Security is 8. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2020-11-01 to 2024-11-01.)
ArticleCitations
Adversarial EXEmples69
On Generating Network Traffic Datasets with Synthetic Attacks for Intrusion Detection40
Maat24
MOTION – A Framework for Mixed-Protocol Multi-Party Computation21
The Android Platform Security Model21
An Extensive Formal Analysis of Multi-factor Authentication Protocols21
Assessing Cyber Risk in Cyber-Physical Systems Using the ATT&CK Framework21
Design, Development, and Evaluation of a Cybersecurity, Privacy, and Digital Literacy Game for Tweens20
A Deep Dive Inside DREBIN: An Explorative Analysis beyond Android Malware Detection Scores19
Privacy-Preserving Decision Trees Training and Prediction18
Dealing with Security Alert Flooding: Using Machine Learning for Domain-independent Alert Aggregation18
Privacy-preserving Dynamic Symmetric Searchable Encryption with Controllable Leakage15
FENCE: Feasible Evasion Attacks on Neural Networks in Constrained Environments14
Euler : Detecting Network Lateral Movement via Scalable Temporal Link Prediction14
Privacy Policies across the Ages: Content of Privacy Policies 1996–202113
Flexible Mechanisms for Remote Attestation13
A Large-Scale Analysis of the Semantic Password Model and Linguistic Patterns in Passwords13
Pump Up Password Security! Evaluating and Enhancing Risk-Based Authentication on a Real-World Large-Scale Online Service13
Attack Context Embedded Data Driven Trust Diagnostics in Smart Metering Infrastructure13
Analyzing Dynamic Code13
A Systematic Analysis of the Capital One Data Breach: Critical Lessons Learned12
SoK: A Modularized Approach to Study the Security of Automatic Speech Recognition Systems10
Security Best Practices: A Critical Analysis Using IoT as a Case Study10
Adaptive Cyber Defense Against Multi-Stage Attacks Using Learning-Based POMDP10
On the Security of Smartphone Unlock PINs9
Systematic Mutation-Based Evaluation of the Soundness of Security-Focused Android Static Analysis Techniques9
Generating Quality Threat Intelligence Leveraging OSINT and a Cyber Threat Unified Taxonomy9
EI-MTD: Moving Target Defense for Edge Intelligence against Adversarial Attacks9
Optimal Packet Camouflage Against Traffic Analysis9
SoK: Human-centered Phishing Susceptibility9
Exploitation Techniques for Data-oriented Attacks with Existing and Potential Defense Approaches9
Friendly Fire8
One Size Does Not Fit All8
Vulnerabilities of Unattended Face Verification Systems to Facial Components-based Presentation Attacks: An Empirical Study8
Two-factor Password-authenticated Key Exchange with End-to-end Security8
Risk Prediction of IoT Devices Based on Vulnerability Analysis8
Hidden in Plain Sight: Exploring Privacy Risks of Mobile Augmented Reality Applications8
0.022258996963501