0.9(top 50%)
impact factor
2.5K(top 10%)
papers
10.2K(top 20%)
citations
35(top 20%)
h-index
1.1(top 50%)
impact factor
4.7K
all documents
11.0K
doc citations
61(top 20%)
g-index

Top Articles

#TitleJournalYearCitations
1Advanced Encryption Standard (AES)Network Security2009454
2Advanced Persistent threats and how to monitor and deter themNetwork Security2011264
3What the GDPR means for businessesNetwork Security2016146
4Big data securityNetwork Security2012126
5Caught in the cross-site scripting fireNetwork Security2012122
6Ransomware attacks: detection, prevention and cureNetwork Security2016120
7US Homeland Security BillNetwork Security2002111
8DataVault: secure mobile access and data sharingNetwork Security2011105
9BYOD security challenges: control and protect your most sensitive dataNetwork Security2012100
10IBM: Cost of a Data BreachNetwork Security202295
11Forensic investigation of cloud computing systemsNetwork Security201192
12TCP SYN flooding and IP spoofing attacksNetwork Security199683
13A web engineering security methodology for e-learning systemsNetwork Security201177
14BYOD: enabling the chaosNetwork Security201277
15Artificial intelligence – the next frontier in IT security?Network Security201773
16Bug found in Java Virtual MachineNetwork Security199770
17Ransomware: taking businesses hostageNetwork Security201665
18What Makes an Effective Information Security Policy?Network Security200263
19Moving to analysis-led cyber-securityNetwork Security201461
20The Advanced Encryption StandardNetwork Security200154
21Bitcoin and Cryptocurrency Technologies Arvind Narayanan, Joseph Bonneau, Edward Felten, Andrew Miller and Steven Goldfeder.Network Security201653
22Advanced persistent threats: minimising the damageNetwork Security201452
23Healthcare and digital transformationNetwork Security201752
24The growth and evolution of DDoSNetwork Security201551
25Connected cars – the next targe tfor hackersNetwork Security201549
26Computer and Information Security HandbookNetwork Security201749
27Securing the blockchain against hackersNetwork Security201849
28The big data security challengeNetwork Security201548
29UK Government launches new £1.9bn cyber-security strategyNetwork Security201648
30Europol: Internet Organised Crime Threat AssessmentNetwork Security201848
31Privacy features of European eID card specificationsNetwork Security200847
32Microsoft SDL Threat Modelling ToolNetwork Security200944
33Bridging mobile security gapsNetwork Security201644
34Hybrid intrusion detection system using machine learningNetwork Security202043
35The Ashley Madison affairNetwork Security201541
36DDoS attack evolutionNetwork Security200839
37Trusted Computing Platform AllianceNetwork Security200135
38Security awareness: switch to a better programmeNetwork Security200635
39The Java vulnerability landscapeNetwork Security201435
40DDoS goes mainstream: how headline-grabbing attacks could make this threat an organisation's biggest nightmareNetwork Security201635
41Danger in the cloudsNetwork Security200834
42GDPR: its time has comeNetwork Security201833
43Cars of the future: the Internet of Things in the automotive industryNetwork Security201532
44DDoS attacks: past, present and futureNetwork Security201832
45Accenture/Ponemon Institute: The Cost of CybercrimeNetwork Security201932
46The security implications of BYODNetwork Security201331
47GDPR: a milestone in convergence for cyber-security and complianceNetwork Security201731
48The energy impact of security mechanisms in modern mobile devicesNetwork Security201230
49Unveiling the dark webNetwork Security201430
50The security implications of IPv6Network Security201329