2.6K(top 1%)
papers
39.0K(top 1%)
citations
77(top 1%)
h-index
140(top 1%)
g-index
14.9K
all documents
3.3K
doc citations

Top Articles

#TitleJournalYearCitations
1Securing vehicular ad hoc networksJournal of Computer Security20071,290
2Intrusion detection using sequences of system callsJournal of Computer Security1998961
3A sound type system for secure flow analysisJournal of Computer Security1996710
4The inductive approach to verifying cryptographic protocolsJournal of Computer Security1998630
5Searchable symmetric encryption: Improved definitions and efficient constructionsJournal of Computer Security2011621
6Automatic analysis of malware behavior using machine learningJournal of Computer Security2011511
7The economic cost of publicly announced information security breaches: empirical evidence from the stock market*Journal of Computer Security2003501
8Strand spaces: proving security protocols correctJournal of Computer Security1999407
9A conceptual foundation for organizational information security awarenessInformation Management and Computer Security2000404
10Practical automated detection of stealthy portscansJournal of Computer Security2002315
11The importance of perceived trust, security and privacy in online trading systemsInformation Management and Computer Security2009286
12HyperpropertiesJournal of Computer Security2010281
13Competency based management: a review of systems and approachesInformation Management and Computer Security2006275
14A Classification of Security Properties for Process Algebras1Journal of Computer Security1995265
15Privacy and security concerns as major barriers for e‐commerce: a survey studyInformation Management and Computer Security2001258
16Certificate chain discovery in SPKI/SDSIJournal of Computer Security2001246
17Distributed credential chain discovery in trust management*Journal of Computer Security2003231
18Casper: A compiler for the analysis of security protocolsJournal of Computer Security1998224
19Practical Attack Graph Generation for Network DefenseProceedings of the Computer Security Applications Conference2006222
20STATL: An attack language for state-based intrusion detectionJournal of Computer Security2002217
21Verifying privacy-type properties of electronic voting protocolsJournal of Computer Security2009216
22A research framework for social commerce adoptionInformation Management and Computer Security2013207
23Toward cost-sensitive modeling for intrusion detection and responseJournal of Computer Security2002200
24NetSTAT: A network-based intrusion detection systemJournal of Computer Security1999190
25Real time business intelligence in supply chain analyticsInformation Management and Computer Security2008188
26What went wrong? Unsuccessful information technology projectsInformation Management and Computer Security1999180
27Quantifying the financial impact of IT security breachesInformation Management and Computer Security2003179
28Interpretive structural modeling (ISM) of IT‐enablers for Indian manufacturing SMEsInformation Management and Computer Security2008179
29An empirical study of the effect of perceived risk upon intention to use online applicationsInformation Management and Computer Security2005178
30Secure set intersection cardinality with application to association rule miningJournal of Computer Security2005177
31Automatic verification of correspondences for security protocols*Journal of Computer Security2009170
32Private key generation from on‐line handwritten signaturesInformation Management and Computer Security2002165
33Information security awareness: educating your users effectivelyInformation Management and Computer Security1998160
34Shared and searchable encrypted data for untrusted serversJournal of Computer Security2011160
35Athena: a novel approach to efficient automatic security protocol analysis1Journal of Computer Security2001158
36A uniform framework for regulating service access and information release on the WebJournal of Computer Security2002156
37Information security: management's effect on culture and policyInformation Management and Computer Security2006155
38Information hiding, anonymity and privacy: a modular approachJournal of Computer Security2004149
39Covert and Side Channels Due to Processor ArchitectureProceedings of the Computer Security Applications Conference2006149
40Address Space Layout Permutation (ASLP): Towards Fine-Grained Randomization of Commodity SoftwareProceedings of the Computer Security Applications Conference2006148
41Towards Operational Measures of Computer SecurityJournal of Computer Security1993147
42Strategies for successful CRM implementationInformation Management and Computer Security2007147
43Side channel cryptanalysis of product ciphersJournal of Computer Security2000145
44The impact of information security breaches: Has there been a downward shift in costs?Journal of Computer Security2011143
45Variables influencing information security policy complianceInformation Management and Computer Security2014141
46Declassification: Dimensions and principlesJournal of Computer Security2009140
47Secure attribute-based systemsJournal of Computer Security2010134
48Data security and consumer trust in FinTech innovation in GermanyInformation and Computer Security2018131
49Authentic data publication over the Internet1Journal of Computer Security2003126
50Authorization in Distributed Systems: A New Approach1Journal of Computer Security1993125
51A holistic model of computer abuse within organizationsInformation Management and Computer Security2002125
52Exploring radio frequency identification technology and its impact on business systemsInformation Management and Computer Security2005125
53Applying Formal Methods to the Analysis of a Key Management ProtocolJournal of Computer Security1992124
54A static analysis for quantifying information flow in a simple imperative languageJournal of Computer Security2007124
55Information priority‐setting for better resource allocation using analytic hierarchy process (AHP)Information Management and Computer Security2001123
56A taxonomy of intrusion response systemsInternational Journal of Information and Computer Security2007119
57E‐commerce usage and business performance in the Malaysian tourism sector: empirical analysisInformation Management and Computer Security2009119
58A survey of algebraic properties used in cryptographic protocolsJournal of Computer Security2006117
59SIA: Secure information aggregation in sensor networksJournal of Computer Security2007116
60A cost-based framework for analysis of denial of service in networksJournal of Computer Security2001111
61A derivation system and compositional logic for security protocolsJournal of Computer Security2005111
62New filtering approaches for phishing emailJournal of Computer Security2010108
63Multiset rewriting and the complexity of bounded security protocolsJournal of Computer Security2004106
64Anonymity and information hiding in multiagent systemsJournal of Computer Security2005106
65An integrated view of human, organizational, and technological challenges of IT security managementInformation Management and Computer Security2009103
66An integrated system theory of information security managementInformation Management and Computer Security2003101
67Implementation and effectiveness of organizational information security measuresInformation Management and Computer Security2008101
68Design and Semantics of a Decentralized Authorization LanguageComputer Security Foundations Workshop (CSFW), Proceedings of the IEEE200799
69Security culture and the employment relationship as drivers of employees’ security complianceInformation Management and Computer Security201497
70Static validation of security protocolsJournal of Computer Security200596
71Probabilistic noninterference in a concurrent language1Journal of Computer Security199995
72Aggregating vulnerability metrics in enterprise networks using attack graphsJournal of Computer Security201395
73Phishing counter measures and their effectiveness – literature reviewInformation Management and Computer Security201293
74Impact of perceived technical protection on security behaviorsInformation Management and Computer Security200988
75Authenticity by typing for security protocols1Journal of Computer Security200387
76SecPAL: Design and semantics of a decentralized authorization languageJournal of Computer Security201086
77A compositional logic for proving security properties of protocols*Journal of Computer Security200385
78Proving Noninterference and Functional Correctness Using TracesJournal of Computer Security199284
79Process algebra and non-interferenceJournal of Computer Security200184
80BI and ERP integrationInformation Management and Computer Security200584
81Model-based analysis of configuration vulnerabilities1Journal of Computer Security200282
82Hordes: a multicast based protocol for anonymity1Journal of Computer Security200280
83Probabilistic analysis of an anonymity systemJournal of Computer Security200479
84Privacy preserving multi-factor authentication with biometricsJournal of Computer Security200779
85Information security management: why standards are importantInformation Management and Computer Security199978
86A privacy-aware access control systemJournal of Computer Security200878
87A survey of intrusion detection and prevention systemsInformation Management and Computer Security201078
88Why do some people manage phishing e‐mails better than others?Information Management and Computer Security201277
89Toward a Mathematical Foundation for Information Flow SecurityJournal of Computer Security199276
90Using sample size to limit exposure to data miningJournal of Computer Security200076
91Global e‐commerce: a framework for understanding and overcoming the trust barrierInformation Management and Computer Security200376
92Developing e‐business; a strategic approachInformation Management and Computer Security200275
93Role of trust in e‐business successInformation Management and Computer Security200475
94A framework for analyzing RFID distance bounding protocolsJournal of Computer Security201175
95Managing and controlling computer misuseInformation Management and Computer Security199972
96Web technology and supply chain managementInformation Management and Computer Security200472
97A conceptual framework for information technology governance effectiveness in private organizationsInformation Management and Computer Security201272
98The sufficiency of the theory of planned behavior for explaining information security policy complianceInformation and Computer Security201571
99Towards a completeness result for model checking of security protocolsJournal of Computer Security199970
100E‐commerce Web site design: strategies and modelsInformation Management and Computer Security200170