1.6(top 50%)
impact factor
2.0K(top 10%)
papers
42.1K(top 10%)
citations
83(top 10%)
h-index
1.7(top 50%)
impact factor
3.2K
all documents
44.3K
doc citations
159(top 5%)
g-index

Top Articles

#TitleJournalYearCitations
1Stuxnet: Dissecting a Cyberwarfare WeaponIEEE Security and Privacy20111,253
2Security and Privacy Challenges in Cloud Computing EnvironmentsIEEE Security and Privacy2010923
3Security and Privacy Challenges in the Smart GridIEEE Security and Privacy2009902
4Hide and seek: an introduction to steganographyIEEE Security and Privacy2003798
5Biometric recognition: security and privacy concernsIEEE Security and Privacy2003780
6Inside the Slammer wormIEEE Security and Privacy2003762
7Privacy and rationality in individual decision makingIEEE Security and Privacy2005679
8The security and privacy of smart vehiclesIEEE Security and Privacy2004593
9Toward Automated Dynamic Malware Analysis Using CWSandboxIEEE Security and Privacy2007542
10Understanding Cloud Computing VulnerabilitiesIEEE Security and Privacy2011527
11Data Security in the World of Cloud ComputingIEEE Security and Privacy2009509
12Smart-grid security issuesIEEE Security and Privacy2010497
13Password memorability and security: empirical resultsIEEE Security and Privacy2004457
14Understanding Android SecurityIEEE Security and Privacy2009409
15RFID Privacy: An Overview of Problems and Proposed SolutionsIEEE Security and Privacy2005367
16Common Vulnerability Scoring SystemIEEE Security and Privacy2006364
17Side Channels in Cloud Services: Deduplication in Cloud StorageIEEE Security and Privacy2010359
18A survey of secure wireless ad hoc routingIEEE Security and Privacy2004343
19Software securityIEEE Security and Privacy2004323
20The Honeynet Project: trapping the hackersIEEE Security and Privacy2003291
21Google Android: A Comprehensive Security AssessmentIEEE Security and Privacy2010275
22Secret-ballot receipts: true voter-verifiable electionsIEEE Security and Privacy2004262
23Using Entropy Analysis to Find Encrypted and Packed MalwareIEEE Security and Privacy2007253
24Static analysis for securityIEEE Security and Privacy2004250
25A First Look at Identity Management Schemes on the BlockchainIEEE Security and Privacy2018242
26What Anyone Can Know: The Privacy Risks of Social Networking SitesIEEE Security and Privacy2007241
27Man-in-the-Middle Attack to the HTTPS ProtocolIEEE Security and Privacy2009230
28Inferring Personal Information from Demand-Response SystemsIEEE Security and Privacy2010228
29The spread of the Witty wormIEEE Security and Privacy2004226
30Privacy-Preserving Machine Learning: Threats and SolutionsIEEE Security and Privacy2019211
31Low-Energy Security: Limits and Opportunities in the Internet of ThingsIEEE Security and Privacy2015199
32Blockchain Access Privacy: Challenges and DirectionsIEEE Security and Privacy2018196
33Big Data Analytics for SecurityIEEE Security and Privacy2013193
34Typing patterns: a key to user identificationIEEE Security and Privacy2004192
35Is Bitcoin a Decentralized Currency?IEEE Security and Privacy2014190
36Is finding security holes a good idea?IEEE Security and Privacy2005188
37Enabling Video Privacy through Computer VisionIEEE Security and Privacy2005182
38Software penetration testingIEEE Security and Privacy2005177
39Protecting privacy in continuous location-tracking applicationsIEEE Security and Privacy2004174
40Going Spear Phishing: Exploring Embedded Training and AwarenessIEEE Security and Privacy2014168
41Overview of IEEE 802.16 securityIEEE Security and Privacy2004163
42Privacy Interests in Prescription Data, Part 2: Patient PrivacyIEEE Security and Privacy2009151
43Software security testingIEEE Security and Privacy2004150
44A Research Agenda Acknowledging the Persistence of PasswordsIEEE Security and Privacy2012150
45Valuating PrivacyIEEE Security and Privacy2005149
46Finding Focus in the Blur of Moving-Target TechniquesIEEE Security and Privacy2014148
47The Venn of Identity: Options and Issues in Federated Identity ManagementIEEE Security and Privacy2008146
48Obfuscation: The Hidden MalwareIEEE Security and Privacy2011146
49Violating Assumptions with FuzzingIEEE Security and Privacy2005145
50Nudging Privacy: The Behavioral Economics of Personal InformationIEEE Security and Privacy2009142