5.6(top 5%)
impact factor
2.1K(top 10%)
papers
30.4K(top 10%)
citations
74(top 10%)
h-index
5.8(top 5%)
impact factor
3.4K
all documents
32.4K
doc citations
111(top 10%)
g-index

Top Articles

#TitleJournalYearCitations
1A review of wireless sensors and networks' applications in agricultureComputer Standards and Interfaces2014529
2Advanced supervised learning in multi-layer perceptrons — From backpropagation to adaptive learning algorithmsComputer Standards and Interfaces1994417
3BPMN: An introduction to the standardComputer Standards and Interfaces2012416
4An improved smart card based password authentication scheme with provable securityComputer Standards and Interfaces2009322
5A secure dynamic ID based remote user authentication scheme for multi-server environmentComputer Standards and Interfaces2009312
6Mutual authentication protocol for RFID conforming to EPC Class 1 Generation 2 standardsComputer Standards and Interfaces2007304
7Improvement of the secure dynamic ID based remote user authentication scheme for multi-server environmentComputer Standards and Interfaces2009259
8Using a multi-criteria decision making approach to evaluate mobile phone alternativesComputer Standards and Interfaces2007255
9Advanced smart card based password authentication protocolComputer Standards and Interfaces2010232
10Data hiding method using image interpolationComputer Standards and Interfaces2009220
11A new robust reference watermarking scheme based on DWT-SVDComputer Standards and Interfaces2009207
12Agile Requirements Engineering: A systematic literature reviewComputer Standards and Interfaces2017199
13An effective image retrieval scheme using color, texture and shape featuresComputer Standards and Interfaces2011198
14Object-Z: A specification language advocated for the description of standardsComputer Standards and Interfaces1995171
15A flexible biometrics remote user authentication schemeComputer Standards and Interfaces2004170
16Improving the robustness of DCT-based image watermarking against JPEG compressionComputer Standards and Interfaces2010167
17A common criteria based security requirements engineering process for the development of secure information systemsComputer Standards and Interfaces2007164
18Technology pillars in the architecture of future 5G mobile networks: NFV, MEC and SDNComputer Standards and Interfaces2017158
19Consumer-based m-commerce: exploring consumer perception of mobile applicationsComputer Standards and Interfaces2005155
20Named Entity Recognition: Fallacies, challenges and opportunitiesComputer Standards and Interfaces2013143
21A systematic review of security requirements engineeringComputer Standards and Interfaces2010140
22The antecedent factors on trust and commitment in supply chain relationshipsComputer Standards and Interfaces2011140
23How to develop usability heuristics: A systematic literature reviewComputer Standards and Interfaces2017138
24Sharing visual multi-secrets using circle sharesComputer Standards and Interfaces2005137
25Improving the security of ‘a flexible biometrics remote user authentication scheme’Computer Standards and Interfaces2007137
26The UML as a formal modeling notationComputer Standards and Interfaces1998134
27Smart phone for mobile commerceComputer Standards and Interfaces2009133
28A semi-blind digital watermarking scheme based on singular value decompositionComputer Standards and Interfaces2006132
29Security of Chien et al.'s remote user authentication scheme using smart cardsComputer Standards and Interfaces2004127
30Cryptanalysis and improvement on two efficient remote user authentication scheme using smart cardsComputer Standards and Interfaces2007123
31An AHP-based methodology to rank critical success factors of executive information systemsComputer Standards and Interfaces2005121
32Towards pre-standardization of trust and reputation models for distributed and heterogeneous systemsComputer Standards and Interfaces2010117
33Vehicle model recognition from frontal view image measurementsComputer Standards and Interfaces2011113
34Performance evaluation of switched Ethernet for real-time industrial communicationsComputer Standards and Interfaces2002112
35Denial-of-Service attacks and countermeasures in IEEE 802.11 wireless networksComputer Standards and Interfaces2009111
36A synergic analysis for Web-based enterprise resources planning systemsComputer Standards and Interfaces2002107
37Building automation systems: Concepts and technology reviewComputer Standards and Interfaces2016106
38A methodology to develop usability/user experience heuristicsComputer Standards and Interfaces2018106
39Improved remote authentication scheme with smart cardComputer Standards and Interfaces2005104
40A hybrid particle swarm optimization algorithm for optimal task assignment in distributed systemsComputer Standards and Interfaces2006103
41Semantic annotations for web services discovery and compositionComputer Standards and Interfaces2009101
42Research on Big Data – A systematic mapping studyComputer Standards and Interfaces2017101
43The impact of enterprise risk management on competitive advantage by moderating role of information technologyComputer Standards and Interfaces2019101
44A new provably secure authentication and key agreement protocol for SIP using ECCComputer Standards and Interfaces200999
45A standard reference model for intelligent multimedia presentation systemsComputer Standards and Interfaces199796
46Four-parameter fitting of sine wave testing result: iteration and convergenceComputer Standards and Interfaces200496
47User acceptance of WAP services: test of competing theoriesComputer Standards and Interfaces200596
48A review on application of technology systems, standards and interfaces for agriculture and food sectorComputer Standards and Interfaces201396
49A hybrid public key infrastructure solution (HPKI) for HIPAA privacy/security regulationsComputer Standards and Interfaces201093
50Efficient and provably-secure certificateless short signature scheme from bilinear pairingsComputer Standards and Interfaces200992