1.3(top 50%)
impact factor
2.4K(top 10%)
papers
43.6K(top 10%)
citations
84(top 10%)
h-index
1.4(top 50%)
extended IF
3.3K
all documents
45.8K
doc citations
162(top 5%)
g-index

Top Articles

#TitleJournalYearCitations
1Stuxnet: Dissecting a Cyberwarfare WeaponIEEE Security and Privacy20111,312
2Security and Privacy Challenges in Cloud Computing EnvironmentsIEEE Security and Privacy2010937
3Security and Privacy Challenges in the Smart GridIEEE Security and Privacy2009925
4Hide and seek: an introduction to steganographyIEEE Security and Privacy2003811
5Biometric recognition: security and privacy concernsIEEE Security and Privacy2003787
6Inside the Slammer wormIEEE Security and Privacy2003768
7Privacy and rationality in individual decision makingIEEE Security and Privacy2005711
8The security and privacy of smart vehiclesIEEE Security and Privacy2004599
9Toward Automated Dynamic Malware Analysis Using CWSandboxIEEE Security and Privacy2007548
10Understanding Cloud Computing VulnerabilitiesIEEE Security and Privacy2011532
11Data Security in the World of Cloud ComputingIEEE Security and Privacy2009518
12Smart-grid security issuesIEEE Security and Privacy2010503
13Password memorability and security: empirical resultsIEEE Security and Privacy2004463
14Understanding Android SecurityIEEE Security and Privacy2009411
15Common Vulnerability Scoring SystemIEEE Security and Privacy2006383
16Side Channels in Cloud Services: Deduplication in Cloud StorageIEEE Security and Privacy2010375
17RFID Privacy: An Overview of Problems and Proposed SolutionsIEEE Security and Privacy2005368
18A survey of secure wireless ad hoc routingIEEE Security and Privacy2004344
19Software securityIEEE Security and Privacy2004334
20The Honeynet Project: trapping the hackersIEEE Security and Privacy2003295
21Google Android: A Comprehensive Security AssessmentIEEE Security and Privacy2010276
22Secret-ballot receipts: true voter-verifiable electionsIEEE Security and Privacy2004265
23Using Entropy Analysis to Find Encrypted and Packed MalwareIEEE Security and Privacy2007262
24A First Look at Identity Management Schemes on the BlockchainIEEE Security and Privacy2018261
25Static analysis for securityIEEE Security and Privacy2004260
26Man-in-the-Middle Attack to the HTTPS ProtocolIEEE Security and Privacy2009245
27What Anyone Can Know: The Privacy Risks of Social Networking SitesIEEE Security and Privacy2007241
28Privacy-Preserving Machine Learning: Threats and SolutionsIEEE Security and Privacy2019237
29Inferring Personal Information from Demand-Response SystemsIEEE Security and Privacy2010232
30The spread of the Witty wormIEEE Security and Privacy2004227
31Blockchain Access Privacy: Challenges and DirectionsIEEE Security and Privacy2018205
32Low-Energy Security: Limits and Opportunities in the Internet of ThingsIEEE Security and Privacy2015204
33Is Bitcoin a Decentralized Currency?IEEE Security and Privacy2014200
34Big Data Analytics for SecurityIEEE Security and Privacy2013195
35Typing patterns: a key to user identificationIEEE Security and Privacy2004193
36Is finding security holes a good idea?IEEE Security and Privacy2005190
37Enabling Video Privacy through Computer VisionIEEE Security and Privacy2005184
38Software penetration testingIEEE Security and Privacy2005184
39Going Spear Phishing: Exploring Embedded Training and AwarenessIEEE Security and Privacy2014178
40Protecting privacy in continuous location-tracking applicationsIEEE Security and Privacy2004174
41Ethics and Privacy in AI and Big Data: Implementing Responsible Research and InnovationIEEE Security and Privacy2018173
42Overview of IEEE 802.16 securityIEEE Security and Privacy2004163
43Cybersecurity in an Era with Quantum Computers: Will We Be Ready?IEEE Security and Privacy2018159
44Software security testingIEEE Security and Privacy2004156
45A Research Agenda Acknowledging the Persistence of PasswordsIEEE Security and Privacy2012155
46Finding Focus in the Blur of Moving-Target TechniquesIEEE Security and Privacy2014154
47Valuating PrivacyIEEE Security and Privacy2005153
48Privacy Interests in Prescription Data, Part 2: Patient PrivacyIEEE Security and Privacy2009151
49Obfuscation: The Hidden MalwareIEEE Security and Privacy2011151
50The Venn of Identity: Options and Issues in Federated Identity ManagementIEEE Security and Privacy2008148