6.4(top 5%)
impact factor
5.1K(top 5%)
papers
90.0K(top 5%)
citations
119(top 5%)
h-index
6.7(top 5%)
impact factor
7.4K
all documents
96.1K
doc citations
186(top 5%)
g-index

Top Articles

#TitleJournalYearCitations
1Anomaly-based network intrusion detection: Techniques, systems and challengesComputers and Security20091,276
2Toward developing a systematic approach to generate benchmark datasets for intrusion detectionComputers and Security2012892
3Privacy attitudes and privacy behaviour: A review of current research on the privacy paradox phenomenonComputers and Security2017647
4Use of K-Nearest Neighbor classifier for intrusion detectionComputers and Security2002611
5From information security to cyber securityComputers and Security2013566
6An empirical comparison of botnet detection methodsComputers and Security2014553
7Computer virusesComputers and Security1987537
8Understanding information systems security policy compliance: An integration of the theory of planned behavior and the protection motivation theoryComputers and Security2012530
9Bubbles of Trust: A decentralized blockchain-based authentication system for IoTComputers and Security2018487
10Radio frequency identification (RFID)Computers and Security2006477
11Analysis of end user security behaviorsComputers and Security2005455
12Feature deduction and ensemble design of intrusion detection systemsComputers and Security2005445
13Future directions for behavioral information security researchComputers and Security2013440
14Security issues in SCADA networksComputers and Security2006432
15A survey of network-based intrusion detection data setsComputers and Security2019417
16A review of cyber security risk assessment methods for SCADA systemsComputers and Security2016411
17An Efficient and Practical Solution to Remote Authentication: Smart CardComputers and Security2002391
18Electromagnetic radiation from video display units: An eavesdropping risk?Computers and Security1985385
19Secure attribute-based data sharing for resource-limited users in cloud computingComputers and Security2018384
20The cyber threat landscape: Challenges and future research directionsComputers and Security2011329
21Survey of machine learning techniques for malware analysisComputers and Security2019294
22Cyber security in the age of COVID-19: A timeline and analysis of cyber-crime and cyber-attacks during the pandemicComputers and Security2021294
23A survey of intrusion detection techniquesComputers and Security1993290
24Cyber physical systems security: Analysis, challenges and solutionsComputers and Security2017286
25Towards information security behavioural complianceComputers and Security2004282
26A survey of coordinated attacks and collaborative intrusion detectionComputers and Security2010282
27An optimal cluster formation based energy efficient dynamic scheduling hybrid MAC protocol for heavy traffic load in wireless sensor networksComputers and Security2018279
28A taxonomy of network and computer attacksComputers and Security2005274
29Botnet detection based on traffic behavior analysis and flow intervalsComputers and Security2013261
30A framework and assessment instrument for information security cultureComputers and Security2010258
31SCADA security in the light of Cyber-WarfareComputers and Security2012257
32A GA-LR wrapper approach for feature selection in network intrusion detectionComputers and Security2017256
33Password authentication schemes with smart cardsComputers and Security1999255
34Intelligent financial fraud detection: A comprehensive reviewComputers and Security2016254
35Explaining the privacy paradox: A systematic review of literature investigating privacy attitude and behaviorComputers and Security2018247
36Determining employee awareness using the Human Aspects of Information Security Questionnaire (HAIS-Q)Computers and Security2014239
37Ransomware threat success factors, taxonomy, and countermeasures: A survey and research directionsComputers and Security2018233
38DL-Droid: Deep learning based android malware detection using real devicesComputers and Security2020233
39Information security policy compliance model in organizationsComputers and Security2016232
40A framework for understanding and predicting insider attacksComputers and Security2002231
41A survey on technical threat intelligence in the age of sophisticated cyber attacksComputers and Security2018231
42Applications of blockchain in ensuring the security and privacy of electronic health record systems: A surveyComputers and Security2020231
43A prototype for assessing information security awarenessComputers and Security2006224
44Trust management system design for the Internet of Things: A context-aware and multi-service approachComputers and Security2013222
45Self-efficacy in information security: Its influence on end users' information security practice behaviorComputers and Security2009221
46A qualitative study of users' view on information securityComputers and Security2007220
47Operating system protection through program evolutionComputers and Security1993218
48Cyber situational awareness – A systematic review of the literatureComputers and Security2014217
49Image-Based malware classification using ensemble of CNN architectures (IMCEC)Computers and Security2020211
50Data preprocessing for anomaly based network intrusion detection: A reviewComputers and Security2011210