About
Technology
Issues
FAQ
Search
Journals
High Impact Journals
Most Cited Journals
Most Published Journals
Authors
Most Cited Authors
Most Published Authors
Affiliations
Top Institutions
Top Schools
Citing Bodies
Top Citing Authors
Top Citing Institutions
Top Citing Schools
Top Citing Journals
Top Citing Disciplines
exaly
›
Disciplines
›
Computer Security
›
top-articles
Computer Security
2.6K
(top 1%)
papers
39.0K
(top 1%)
citations
77
(top 1%)
h
-index
140
(top 1%)
g
-index
14.9K
all documents
3.3K
doc citations
Top Articles
#
Title
Journal
Year
Citations
1
Securing vehicular ad hoc networks
Journal of Computer Security
2007
1,290
2
Intrusion detection using sequences of system calls
Journal of Computer Security
1998
961
3
A sound type system for secure flow analysis
Journal of Computer Security
1996
710
4
The inductive approach to verifying cryptographic protocols
Journal of Computer Security
1998
630
5
Searchable symmetric encryption: Improved definitions and efficient constructions
Journal of Computer Security
2011
621
6
Automatic analysis of malware behavior using machine learning
Journal of Computer Security
2011
511
7
The economic cost of publicly announced information security breaches: empirical evidence from the stock market*
Journal of Computer Security
2003
501
8
Strand spaces: proving security protocols correct
Journal of Computer Security
1999
407
9
A conceptual foundation for organizational information security awareness
Information Management and Computer Security
2000
404
10
Practical automated detection of stealthy portscans
Journal of Computer Security
2002
315
11
The importance of perceived trust, security and privacy in online trading systems
Information Management and Computer Security
2009
286
12
Hyperproperties
Journal of Computer Security
2010
281
13
Competency based management: a review of systems and approaches
Information Management and Computer Security
2006
275
14
A Classification of Security Properties for Process Algebras1
Journal of Computer Security
1995
265
15
Privacy and security concerns as major barriers for e‐commerce: a survey study
Information Management and Computer Security
2001
258
16
Certificate chain discovery in SPKI/SDSI
Journal of Computer Security
2001
246
17
Distributed credential chain discovery in trust management*
Journal of Computer Security
2003
231
18
Casper: A compiler for the analysis of security protocols
Journal of Computer Security
1998
224
19
Practical Attack Graph Generation for Network Defense
Proceedings of the Computer Security Applications Conference
2006
222
20
STATL: An attack language for state-based intrusion detection
Journal of Computer Security
2002
217
21
Verifying privacy-type properties of electronic voting protocols
Journal of Computer Security
2009
216
22
A research framework for social commerce adoption
Information Management and Computer Security
2013
207
23
Toward cost-sensitive modeling for intrusion detection and response
Journal of Computer Security
2002
200
24
NetSTAT: A network-based intrusion detection system
Journal of Computer Security
1999
190
25
Real time business intelligence in supply chain analytics
Information Management and Computer Security
2008
188
26
What went wrong? Unsuccessful information technology projects
Information Management and Computer Security
1999
180
27
Quantifying the financial impact of IT security breaches
Information Management and Computer Security
2003
179
28
Interpretive structural modeling (ISM) of IT‐enablers for Indian manufacturing SMEs
Information Management and Computer Security
2008
179
29
An empirical study of the effect of perceived risk upon intention to use online applications
Information Management and Computer Security
2005
178
30
Secure set intersection cardinality with application to association rule mining
Journal of Computer Security
2005
177
31
Automatic verification of correspondences for security protocols*
Journal of Computer Security
2009
170
32
Private key generation from on‐line handwritten signatures
Information Management and Computer Security
2002
165
33
Information security awareness: educating your users effectively
Information Management and Computer Security
1998
160
34
Shared and searchable encrypted data for untrusted servers
Journal of Computer Security
2011
160
35
Athena: a novel approach to efficient automatic security protocol analysis1
Journal of Computer Security
2001
158
36
A uniform framework for regulating service access and information release on the Web
Journal of Computer Security
2002
156
37
Information security: management's effect on culture and policy
Information Management and Computer Security
2006
155
38
Information hiding, anonymity and privacy: a modular approach
Journal of Computer Security
2004
149
39
Covert and Side Channels Due to Processor Architecture
Proceedings of the Computer Security Applications Conference
2006
149
40
Address Space Layout Permutation (ASLP): Towards Fine-Grained Randomization of Commodity Software
Proceedings of the Computer Security Applications Conference
2006
148
41
Towards Operational Measures of Computer Security
Journal of Computer Security
1993
147
42
Strategies for successful CRM implementation
Information Management and Computer Security
2007
147
43
Side channel cryptanalysis of product ciphers
Journal of Computer Security
2000
145
44
The impact of information security breaches: Has there been a downward shift in costs?
Journal of Computer Security
2011
143
45
Variables influencing information security policy compliance
Information Management and Computer Security
2014
141
46
Declassification: Dimensions and principles
Journal of Computer Security
2009
140
47
Secure attribute-based systems
Journal of Computer Security
2010
134
48
Data security and consumer trust in FinTech innovation in Germany
Information and Computer Security
2018
131
49
Authentic data publication over the Internet1
Journal of Computer Security
2003
126
50
Authorization in Distributed Systems: A New Approach1
Journal of Computer Security
1993
125
51
A holistic model of computer abuse within organizations
Information Management and Computer Security
2002
125
52
Exploring radio frequency identification technology and its impact on business systems
Information Management and Computer Security
2005
125
53
Applying Formal Methods to the Analysis of a Key Management Protocol
Journal of Computer Security
1992
124
54
A static analysis for quantifying information flow in a simple imperative language
Journal of Computer Security
2007
124
55
Information priority‐setting for better resource allocation using analytic hierarchy process (AHP)
Information Management and Computer Security
2001
123
56
A taxonomy of intrusion response systems
International Journal of Information and Computer Security
2007
119
57
E‐commerce usage and business performance in the Malaysian tourism sector: empirical analysis
Information Management and Computer Security
2009
119
58
A survey of algebraic properties used in cryptographic protocols
Journal of Computer Security
2006
117
59
SIA: Secure information aggregation in sensor networks
Journal of Computer Security
2007
116
60
A cost-based framework for analysis of denial of service in networks
Journal of Computer Security
2001
111
61
A derivation system and compositional logic for security protocols
Journal of Computer Security
2005
111
62
New filtering approaches for phishing email
Journal of Computer Security
2010
108
63
Multiset rewriting and the complexity of bounded security protocols
Journal of Computer Security
2004
106
64
Anonymity and information hiding in multiagent systems
Journal of Computer Security
2005
106
65
An integrated view of human, organizational, and technological challenges of IT security management
Information Management and Computer Security
2009
103
66
An integrated system theory of information security management
Information Management and Computer Security
2003
101
67
Implementation and effectiveness of organizational information security measures
Information Management and Computer Security
2008
101
68
Design and Semantics of a Decentralized Authorization Language
Computer Security Foundations Workshop (CSFW), Proceedings of the IEEE
2007
99
69
Security culture and the employment relationship as drivers of employees’ security compliance
Information Management and Computer Security
2014
97
70
Static validation of security protocols
Journal of Computer Security
2005
96
71
Probabilistic noninterference in a concurrent language1
Journal of Computer Security
1999
95
72
Aggregating vulnerability metrics in enterprise networks using attack graphs
Journal of Computer Security
2013
95
73
Phishing counter measures and their effectiveness – literature review
Information Management and Computer Security
2012
93
74
Impact of perceived technical protection on security behaviors
Information Management and Computer Security
2009
88
75
Authenticity by typing for security protocols1
Journal of Computer Security
2003
87
76
SecPAL: Design and semantics of a decentralized authorization language
Journal of Computer Security
2010
86
77
A compositional logic for proving security properties of protocols*
Journal of Computer Security
2003
85
78
Proving Noninterference and Functional Correctness Using Traces
Journal of Computer Security
1992
84
79
Process algebra and non-interference
Journal of Computer Security
2001
84
80
BI and ERP integration
Information Management and Computer Security
2005
84
81
Model-based analysis of configuration vulnerabilities1
Journal of Computer Security
2002
82
82
Hordes: a multicast based protocol for anonymity1
Journal of Computer Security
2002
80
83
Probabilistic analysis of an anonymity system
Journal of Computer Security
2004
79
84
Privacy preserving multi-factor authentication with biometrics
Journal of Computer Security
2007
79
85
Information security management: why standards are important
Information Management and Computer Security
1999
78
86
A privacy-aware access control system
Journal of Computer Security
2008
78
87
A survey of intrusion detection and prevention systems
Information Management and Computer Security
2010
78
88
Why do some people manage phishing e‐mails better than others?
Information Management and Computer Security
2012
77
89
Toward a Mathematical Foundation for Information Flow Security
Journal of Computer Security
1992
76
90
Using sample size to limit exposure to data mining
Journal of Computer Security
2000
76
91
Global e‐commerce: a framework for understanding and overcoming the trust barrier
Information Management and Computer Security
2003
76
92
Developing e‐business; a strategic approach
Information Management and Computer Security
2002
75
93
Role of trust in e‐business success
Information Management and Computer Security
2004
75
94
A framework for analyzing RFID distance bounding protocols
Journal of Computer Security
2011
75
95
Managing and controlling computer misuse
Information Management and Computer Security
1999
72
96
Web technology and supply chain management
Information Management and Computer Security
2004
72
97
A conceptual framework for information technology governance effectiveness in private organizations
Information Management and Computer Security
2012
72
98
The sufficiency of the theory of planned behavior for explaining information security policy compliance
Information and Computer Security
2015
71
99
Towards a completeness result for model checking of security protocols
Journal of Computer Security
1999
70
100
E‐commerce Web site design: strategies and models
Information Management and Computer Security
2001
70
site/software ©
exaly
; All materials licenced under
CC by-SA
.