ACM Transactions on Privacy and Security

Papers
(The TQCC of ACM Transactions on Privacy and Security is 7. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2020-04-01 to 2024-04-01.)
ArticleCitations
Adversarial EXEmples60
Proactively Identifying Emerging Hacker Threats from the Dark Web44
On Generating Network Traffic Datasets with Synthetic Attacks for Intrusion Detection33
Key Negotiation Downgrade Attacks on Bluetooth and Bluetooth Low Energy25
An Extensive Formal Analysis of Multi-factor Authentication Protocols20
The Android Platform Security Model18
MOTION – A Framework for Mixed-Protocol Multi-Party Computation18
Maat17
Design, Development, and Evaluation of a Cybersecurity, Privacy, and Digital Literacy Game for Tweens15
Assessing Cyber Risk in Cyber-Physical Systems Using the ATT&CK Framework15
Privacy-Preserving Decision Trees Training and Prediction15
A Deep Dive Inside DREBIN: An Explorative Analysis beyond Android Malware Detection Scores14
Dealing with Security Alert Flooding: Using Machine Learning for Domain-independent Alert Aggregation14
Quantum Leap and Crash12
Attack Context Embedded Data Driven Trust Diagnostics in Smart Metering Infrastructure12
Using Generative Adversarial Networks to Break and Protect Text Captchas12
NoiSense Print12
Analyzing Dynamic Code11
Following Passive DNS Traces to Detect Stealthy Malicious Domains Via Graph Inference11
Flexible Mechanisms for Remote Attestation11
Euler : Detecting Network Lateral Movement via Scalable Temporal Link Prediction11
Privacy-preserving Dynamic Symmetric Searchable Encryption with Controllable Leakage11
A Systematic Analysis of the Capital One Data Breach: Critical Lessons Learned10
The Seven Deadly Sins of the HTML5 WebAPI9
Efficient Authorization of Graph-database Queries in an Attribute-supporting ReBAC Model9
A Large-Scale Analysis of the Semantic Password Model and Linguistic Patterns in Passwords9
Exploitation Techniques for Data-oriented Attacks with Existing and Potential Defense Approaches8
Optimal Packet Camouflage Against Traffic Analysis8
Pump Up Password Security! Evaluating and Enhancing Risk-Based Authentication on a Real-World Large-Scale Online Service8
Friendly Fire8
FENCE: Feasible Evasion Attacks on Neural Networks in Constrained Environments8
Generating Quality Threat Intelligence Leveraging OSINT and a Cyber Threat Unified Taxonomy8
Build It, Break It, Fix It8
Vulnerabilities of Unattended Face Verification Systems to Facial Components-based Presentation Attacks: An Empirical Study8
Adaptive Cyber Defense Against Multi-Stage Attacks Using Learning-Based POMDP7
On the Security and Usability Implications of Providing Multiple Authentication Choices on Smartphones7
SoK: A Modularized Approach to Study the Security of Automatic Speech Recognition Systems7
The System That Cried Wolf7
Hidden in Plain Sight: Exploring Privacy Risks of Mobile Augmented Reality Applications7
0.017173051834106