About
Technology
Issues
FAQ
Search
Scientometrics
Impact Factor
Discipline Ranks
h
-index
g
-index
Articles
Citations
Article Citations
Citation Distribution
Overviews
Top Institutions
Top Schools
Top Authors
Prolific Authors
Top Articles
Citing Bodies
Top Citing Authors
Top Citing Institutions
Top Citing Schools
Top Citing Journals
Top Citing Disciplines
exaly
›
Journals
›
Computers and Security
›
top-articles
Computers and Security
6.4
(top 5%)
impact factor
5.1K
(top 5%)
papers
90.0K
(top 5%)
citations
119
(top 5%)
h
-index
6.7
(top 5%)
impact factor
7.4K
all documents
96.1K
doc citations
186
(top 5%)
g
-index
Top Articles
#
Title
Journal
Year
Citations
1
Anomaly-based network intrusion detection: Techniques, systems and challenges
Computers and Security
2009
1,276
2
Toward developing a systematic approach to generate benchmark datasets for intrusion detection
Computers and Security
2012
892
3
Privacy attitudes and privacy behaviour: A review of current research on the privacy paradox phenomenon
Computers and Security
2017
647
4
Use of K-Nearest Neighbor classifier for intrusion detection
Computers and Security
2002
611
5
From information security to cyber security
Computers and Security
2013
566
6
An empirical comparison of botnet detection methods
Computers and Security
2014
553
7
Computer viruses
Computers and Security
1987
537
8
Understanding information systems security policy compliance: An integration of the theory of planned behavior and the protection motivation theory
Computers and Security
2012
530
9
Bubbles of Trust: A decentralized blockchain-based authentication system for IoT
Computers and Security
2018
487
10
Radio frequency identification (RFID)
Computers and Security
2006
477
11
Analysis of end user security behaviors
Computers and Security
2005
455
12
Feature deduction and ensemble design of intrusion detection systems
Computers and Security
2005
445
13
Future directions for behavioral information security research
Computers and Security
2013
440
14
Security issues in SCADA networks
Computers and Security
2006
432
15
A survey of network-based intrusion detection data sets
Computers and Security
2019
417
16
A review of cyber security risk assessment methods for SCADA systems
Computers and Security
2016
411
17
An Efficient and Practical Solution to Remote Authentication: Smart Card
Computers and Security
2002
391
18
Electromagnetic radiation from video display units: An eavesdropping risk?
Computers and Security
1985
385
19
Secure attribute-based data sharing for resource-limited users in cloud computing
Computers and Security
2018
384
20
The cyber threat landscape: Challenges and future research directions
Computers and Security
2011
329
21
Survey of machine learning techniques for malware analysis
Computers and Security
2019
294
22
Cyber security in the age of COVID-19: A timeline and analysis of cyber-crime and cyber-attacks during the pandemic
Computers and Security
2021
294
23
A survey of intrusion detection techniques
Computers and Security
1993
290
24
Cyber physical systems security: Analysis, challenges and solutions
Computers and Security
2017
286
25
Towards information security behavioural compliance
Computers and Security
2004
282
26
A survey of coordinated attacks and collaborative intrusion detection
Computers and Security
2010
282
27
An optimal cluster formation based energy efficient dynamic scheduling hybrid MAC protocol for heavy traffic load in wireless sensor networks
Computers and Security
2018
279
28
A taxonomy of network and computer attacks
Computers and Security
2005
274
29
Botnet detection based on traffic behavior analysis and flow intervals
Computers and Security
2013
261
30
A framework and assessment instrument for information security culture
Computers and Security
2010
258
31
SCADA security in the light of Cyber-Warfare
Computers and Security
2012
257
32
A GA-LR wrapper approach for feature selection in network intrusion detection
Computers and Security
2017
256
33
Password authentication schemes with smart cards
Computers and Security
1999
255
34
Intelligent financial fraud detection: A comprehensive review
Computers and Security
2016
254
35
Explaining the privacy paradox: A systematic review of literature investigating privacy attitude and behavior
Computers and Security
2018
247
36
Determining employee awareness using the Human Aspects of Information Security Questionnaire (HAIS-Q)
Computers and Security
2014
239
37
Ransomware threat success factors, taxonomy, and countermeasures: A survey and research directions
Computers and Security
2018
233
38
DL-Droid: Deep learning based android malware detection using real devices
Computers and Security
2020
233
39
Information security policy compliance model in organizations
Computers and Security
2016
232
40
A framework for understanding and predicting insider attacks
Computers and Security
2002
231
41
A survey on technical threat intelligence in the age of sophisticated cyber attacks
Computers and Security
2018
231
42
Applications of blockchain in ensuring the security and privacy of electronic health record systems: A survey
Computers and Security
2020
231
43
A prototype for assessing information security awareness
Computers and Security
2006
224
44
Trust management system design for the Internet of Things: A context-aware and multi-service approach
Computers and Security
2013
222
45
Self-efficacy in information security: Its influence on end users' information security practice behavior
Computers and Security
2009
221
46
A qualitative study of users' view on information security
Computers and Security
2007
220
47
Operating system protection through program evolution
Computers and Security
1993
218
48
Cyber situational awareness – A systematic review of the literature
Computers and Security
2014
217
49
Image-Based malware classification using ensemble of CNN architectures (IMCEC)
Computers and Security
2020
211
50
Data preprocessing for anomaly based network intrusion detection: A review
Computers and Security
2011
210
site/software ©
exaly
; All materials licenced under
CC by-SA
.