About
Technology
Issues
FAQ
Search
Scientometrics
Impact Factor
Discipline Ranks
h
-index
g
-index
Articles
Citations
Article Citations
Citation Distribution
Overviews
Top Institutions
Top Schools
Top Authors
Prolific Authors
Top Articles
Citing Bodies
Top Citing Authors
Top Citing Institutions
Top Citing Schools
Top Citing Journals
Top Citing Disciplines
exaly
›
Journals
›
IEEE Security and Privacy
›
top-articles
IEEE Security and Privacy
1.6
(top 50%)
impact factor
2.0K
(top 10%)
papers
42.1K
(top 10%)
citations
83
(top 10%)
h
-index
1.7
(top 50%)
impact factor
3.2K
all documents
44.3K
doc citations
159
(top 5%)
g
-index
Top Articles
#
Title
Journal
Year
Citations
1
Stuxnet: Dissecting a Cyberwarfare Weapon
IEEE Security and Privacy
2011
1,253
2
Security and Privacy Challenges in Cloud Computing Environments
IEEE Security and Privacy
2010
923
3
Security and Privacy Challenges in the Smart Grid
IEEE Security and Privacy
2009
902
4
Hide and seek: an introduction to steganography
IEEE Security and Privacy
2003
798
5
Biometric recognition: security and privacy concerns
IEEE Security and Privacy
2003
780
6
Inside the Slammer worm
IEEE Security and Privacy
2003
762
7
Privacy and rationality in individual decision making
IEEE Security and Privacy
2005
679
8
The security and privacy of smart vehicles
IEEE Security and Privacy
2004
593
9
Toward Automated Dynamic Malware Analysis Using CWSandbox
IEEE Security and Privacy
2007
542
10
Understanding Cloud Computing Vulnerabilities
IEEE Security and Privacy
2011
527
11
Data Security in the World of Cloud Computing
IEEE Security and Privacy
2009
509
12
Smart-grid security issues
IEEE Security and Privacy
2010
497
13
Password memorability and security: empirical results
IEEE Security and Privacy
2004
457
14
Understanding Android Security
IEEE Security and Privacy
2009
409
15
RFID Privacy: An Overview of Problems and Proposed Solutions
IEEE Security and Privacy
2005
367
16
Common Vulnerability Scoring System
IEEE Security and Privacy
2006
364
17
Side Channels in Cloud Services: Deduplication in Cloud Storage
IEEE Security and Privacy
2010
359
18
A survey of secure wireless ad hoc routing
IEEE Security and Privacy
2004
343
19
Software security
IEEE Security and Privacy
2004
323
20
The Honeynet Project: trapping the hackers
IEEE Security and Privacy
2003
291
21
Google Android: A Comprehensive Security Assessment
IEEE Security and Privacy
2010
275
22
Secret-ballot receipts: true voter-verifiable elections
IEEE Security and Privacy
2004
262
23
Using Entropy Analysis to Find Encrypted and Packed Malware
IEEE Security and Privacy
2007
253
24
Static analysis for security
IEEE Security and Privacy
2004
250
25
A First Look at Identity Management Schemes on the Blockchain
IEEE Security and Privacy
2018
242
26
What Anyone Can Know: The Privacy Risks of Social Networking Sites
IEEE Security and Privacy
2007
241
27
Man-in-the-Middle Attack to the HTTPS Protocol
IEEE Security and Privacy
2009
230
28
Inferring Personal Information from Demand-Response Systems
IEEE Security and Privacy
2010
228
29
The spread of the Witty worm
IEEE Security and Privacy
2004
226
30
Privacy-Preserving Machine Learning: Threats and Solutions
IEEE Security and Privacy
2019
211
31
Low-Energy Security: Limits and Opportunities in the Internet of Things
IEEE Security and Privacy
2015
199
32
Blockchain Access Privacy: Challenges and Directions
IEEE Security and Privacy
2018
196
33
Big Data Analytics for Security
IEEE Security and Privacy
2013
193
34
Typing patterns: a key to user identification
IEEE Security and Privacy
2004
192
35
Is Bitcoin a Decentralized Currency?
IEEE Security and Privacy
2014
190
36
Is finding security holes a good idea?
IEEE Security and Privacy
2005
188
37
Enabling Video Privacy through Computer Vision
IEEE Security and Privacy
2005
182
38
Software penetration testing
IEEE Security and Privacy
2005
177
39
Protecting privacy in continuous location-tracking applications
IEEE Security and Privacy
2004
174
40
Going Spear Phishing: Exploring Embedded Training and Awareness
IEEE Security and Privacy
2014
168
41
Overview of IEEE 802.16 security
IEEE Security and Privacy
2004
163
42
Privacy Interests in Prescription Data, Part 2: Patient Privacy
IEEE Security and Privacy
2009
151
43
Software security testing
IEEE Security and Privacy
2004
150
44
A Research Agenda Acknowledging the Persistence of Passwords
IEEE Security and Privacy
2012
150
45
Valuating Privacy
IEEE Security and Privacy
2005
149
46
Finding Focus in the Blur of Moving-Target Techniques
IEEE Security and Privacy
2014
148
47
The Venn of Identity: Options and Issues in Federated Identity Management
IEEE Security and Privacy
2008
146
48
Obfuscation: The Hidden Malware
IEEE Security and Privacy
2011
146
49
Violating Assumptions with Fuzzing
IEEE Security and Privacy
2005
145
50
Nudging Privacy: The Behavioral Economics of Personal Information
IEEE Security and Privacy
2009
142
site/software ©
exaly
; All materials licenced under
CC by-SA
.