0.4(top 50%)
impact factor
58.6K(top 0.1%)
papers
116.2K(top 5%)
citations
54(top 10%)
h-index
0.6(top 50%)
extended IF
69.9K
all documents
124.2K
doc citations
89(top 10%)
g-index

Top Articles

#TitleJournalYearCitations
1Convolutional Radio Modulation Recognition NetworksCommunications in Computer and Information Science2016653
2Automatic Brain Tumor Detection and Segmentation Using U-Net Based Fully Convolutional NetworksCommunications in Computer and Information Science2017431
3Cloud Computing: Benefits, Risks and Recommendations for Information SecurityCommunications in Computer and Information Science2010291
4The Fourth Paradigm – Data-Intensive Scientific DiscoveryCommunications in Computer and Information Science2012285
5Good Friends, Bad News - Affect and Virality in TwitterCommunications in Computer and Information Science2011208
6Automation of a Business Process Using Robotic Process Automation (RPA): A Case StudyCommunications in Computer and Information Science2017192
7Application of Process Mining in Healthcare – A Case Study in a Dutch HospitalCommunications in Computer and Information Science2008165
8Fighting an Infodemic: COVID-19 Fake News DatasetCommunications in Computer and Information Science2021163
9Adding Virtualization Capabilities to the Grid’5000 TestbedCommunications in Computer and Information Science2013156
10Proposed Security Model and Threat Taxonomy for the Internet of Things (IoT)Communications in Computer and Information Science2010153
11AR-Drone as a Platform for Robotic Research and EducationCommunications in Computer and Information Science2011151
12Interpretable Machine Learning – A Brief History, State-of-the-Art and ChallengesCommunications in Computer and Information Science2020151
13Accelerated Particle Swarm Optimization and Support Vector Machine for Business Optimization and ApplicationsCommunications in Computer and Information Science2011146
14Development of an Assessment Model for Industry 4.0: Industry 4.0-MMCommunications in Computer and Information Science2017143
15Smart Cities Concept and Challenges: Bases for the Assessment of Smart City ProjectsCommunications in Computer and Information Science2015133
16Support Vector Machine Classification Algorithm and Its ApplicationCommunications in Computer and Information Science2012131
17Evaluation Measures of the Classification Performance of Imbalanced Data SetsCommunications in Computer and Information Science2009116
18Computer Vision and Image ProcessingCommunications in Computer and Information Science2021116
19Deep Convolutional Neural Networks for Fire Detection in ImagesCommunications in Computer and Information Science2017113
20Morphological Analyzer and Generator for Russian and Ukrainian LanguagesCommunications in Computer and Information Science2015106
21Unsupervised Clustering Approach for Network Anomaly DetectionCommunications in Computer and Information Science2012102
22EEDBR: Energy-Efficient Depth-Based Routing Protocol for Underwater Wireless Sensor NetworksCommunications in Computer and Information Science201197
23Technical Aspects of Cyber Kill ChainCommunications in Computer and Information Science201595
24A Software Engineering Lifecycle Standard for Very Small EnterprisesCommunications in Computer and Information Science200891
25Attrition in MOOC: Lessons Learned from Drop-Out StudentsCommunications in Computer and Information Science201490
26The Dark Side of Gamification: An Overview of Negative Effects of Gamification in EducationCommunications in Computer and Information Science201889
27Immune Multipath Reliable Transmission with Fault Tolerance in Wireless Sensor NetworksCommunications in Computer and Information Science201689
28DevSecOps: A Multivocal Literature ReviewCommunications in Computer and Information Science201788
29A Survey of Design Techniques for Conversational AgentsCommunications in Computer and Information Science201787
30Migrating to Cloud-Native Architectures Using Microservices: An Experience ReportCommunications in Computer and Information Science201684
31Machine Learning Approach for Multiple Misbehavior Detection in VANETCommunications in Computer and Information Science201184
32Model Checking CSP Revisited: Introducing a Process Analysis ToolkitCommunications in Computer and Information Science200883
33IITKGP-SESC: Speech Database for Emotion AnalysisCommunications in Computer and Information Science200983
34A Deep Learning Based Artificial Neural Network Approach for Intrusion DetectionCommunications in Computer and Information Science201779
35Packet and Flow Based Network Intrusion DatasetCommunications in Computer and Information Science201278
36RGB-T Saliency Detection Benchmark: Dataset, Baselines, Analysis and a Novel ApproachCommunications in Computer and Information Science201877
37Privacy-Preserving Deep Learning: Revisited and EnhancedCommunications in Computer and Information Science201770
38Blockchain in Agriculture: A Systematic Literature ReviewCommunications in Computer and Information Science201869
39Using the Support Vector Machine as a Classification Method for Software Defect Prediction with Static Code MetricsCommunications in Computer and Information Science200968
40Prediction of Protein-Protein Interactions Using Local Description of Amino Acid SequenceCommunications in Computer and Information Science201168
41Cyber Intrusion Detection Using Machine Learning Classification TechniquesCommunications in Computer and Information Science202067
42A Survey of Middleware for Internet of ThingsCommunications in Computer and Information Science201165
43WebVectors: A Toolkit for Building Web Interfaces for Vector Semantic ModelsCommunications in Computer and Information Science201765
44MANDY: Towards a Smart Primary Care Chatbot ApplicationCommunications in Computer and Information Science201765
457th Open Challenge on Question Answering over Linked Data (QALD-7)Communications in Computer and Information Science201764
46A Joint Embedding Method for Entity Alignment of Knowledge BasesCommunications in Computer and Information Science201663
47Towards Achieving Accountability, Auditability and Trust in Cloud ComputingCommunications in Computer and Information Science201162
48Multi-stream Deep Networks for Person to Person Violence Detection in VideosCommunications in Computer and Information Science201662
49Agile IT: Thinking in User-Centric ModelsCommunications in Computer and Information Science200861
50Subjectivity and Sentiment Analysis of Arabic: A SurveyCommunications in Computer and Information Science201259