About
Technology
Issues
FAQ
Search
Scientometrics
Impact Factor
Discipline Ranks
h
-index
g
-index
Articles
Citations
Article Citations
Citation Distribution
Overviews
Top Institutions
Top Schools
Top Authors
Prolific Authors
Top Articles
Citing Bodies
Top Citing Authors
Top Citing Institutions
Top Citing Schools
Top Citing Journals
Top Citing Disciplines
exaly
›
Journals
›
Network Security
›
top-articles
Network Security
0.9
(top 50%)
impact factor
2.5K
(top 10%)
papers
10.2K
(top 20%)
citations
35
(top 20%)
h
-index
1.1
(top 50%)
impact factor
4.7K
all documents
11.0K
doc citations
61
(top 20%)
g
-index
Top Articles
#
Title
Journal
Year
Citations
1
Advanced Encryption Standard (AES)
Network Security
2009
454
2
Advanced Persistent threats and how to monitor and deter them
Network Security
2011
264
3
What the GDPR means for businesses
Network Security
2016
146
4
Big data security
Network Security
2012
126
5
Caught in the cross-site scripting fire
Network Security
2012
122
6
Ransomware attacks: detection, prevention and cure
Network Security
2016
120
7
US Homeland Security Bill
Network Security
2002
111
8
DataVault: secure mobile access and data sharing
Network Security
2011
105
9
BYOD security challenges: control and protect your most sensitive data
Network Security
2012
100
10
IBM: Cost of a Data Breach
Network Security
2022
95
11
Forensic investigation of cloud computing systems
Network Security
2011
92
12
TCP SYN flooding and IP spoofing attacks
Network Security
1996
83
13
A web engineering security methodology for e-learning systems
Network Security
2011
77
14
BYOD: enabling the chaos
Network Security
2012
77
15
Artificial intelligence – the next frontier in IT security?
Network Security
2017
73
16
Bug found in Java Virtual Machine
Network Security
1997
70
17
Ransomware: taking businesses hostage
Network Security
2016
65
18
What Makes an Effective Information Security Policy?
Network Security
2002
63
19
Moving to analysis-led cyber-security
Network Security
2014
61
20
The Advanced Encryption Standard
Network Security
2001
54
21
Bitcoin and Cryptocurrency Technologies Arvind Narayanan, Joseph Bonneau, Edward Felten, Andrew Miller and Steven Goldfeder.
Network Security
2016
53
22
Advanced persistent threats: minimising the damage
Network Security
2014
52
23
Healthcare and digital transformation
Network Security
2017
52
24
The growth and evolution of DDoS
Network Security
2015
51
25
Connected cars – the next targe tfor hackers
Network Security
2015
49
26
Computer and Information Security Handbook
Network Security
2017
49
27
Securing the blockchain against hackers
Network Security
2018
49
28
The big data security challenge
Network Security
2015
48
29
UK Government launches new £1.9bn cyber-security strategy
Network Security
2016
48
30
Europol: Internet Organised Crime Threat Assessment
Network Security
2018
48
31
Privacy features of European eID card specifications
Network Security
2008
47
32
Microsoft SDL Threat Modelling Tool
Network Security
2009
44
33
Bridging mobile security gaps
Network Security
2016
44
34
Hybrid intrusion detection system using machine learning
Network Security
2020
43
35
The Ashley Madison affair
Network Security
2015
41
36
DDoS attack evolution
Network Security
2008
39
37
Trusted Computing Platform Alliance
Network Security
2001
35
38
Security awareness: switch to a better programme
Network Security
2006
35
39
The Java vulnerability landscape
Network Security
2014
35
40
DDoS goes mainstream: how headline-grabbing attacks could make this threat an organisation's biggest nightmare
Network Security
2016
35
41
Danger in the clouds
Network Security
2008
34
42
GDPR: its time has come
Network Security
2018
33
43
Cars of the future: the Internet of Things in the automotive industry
Network Security
2015
32
44
DDoS attacks: past, present and future
Network Security
2018
32
45
Accenture/Ponemon Institute: The Cost of Cybercrime
Network Security
2019
32
46
The security implications of BYOD
Network Security
2013
31
47
GDPR: a milestone in convergence for cyber-security and compliance
Network Security
2017
31
48
The energy impact of security mechanisms in modern mobile devices
Network Security
2012
30
49
Unveiling the dark web
Network Security
2014
30
50
The security implications of IPv6
Network Security
2013
29
site/software ©
exaly
; All materials licenced under
CC by-SA
.