# | Title | Journal | Year | Citations |
---|
|
1 | Stuxnet: Dissecting a Cyberwarfare Weapon | IEEE Security and Privacy | 2011 | 1,312 |
2 | Security and Privacy Challenges in Cloud Computing Environments | IEEE Security and Privacy | 2010 | 937 |
3 | Security and Privacy Challenges in the Smart Grid | IEEE Security and Privacy | 2009 | 925 |
4 | Hide and seek: an introduction to steganography | IEEE Security and Privacy | 2003 | 811 |
5 | Biometric recognition: security and privacy concerns | IEEE Security and Privacy | 2003 | 787 |
6 | Inside the Slammer worm | IEEE Security and Privacy | 2003 | 768 |
7 | Privacy and rationality in individual decision making | IEEE Security and Privacy | 2005 | 711 |
8 | The security and privacy of smart vehicles | IEEE Security and Privacy | 2004 | 599 |
9 | Toward Automated Dynamic Malware Analysis Using CWSandbox | IEEE Security and Privacy | 2007 | 548 |
10 | Understanding Cloud Computing Vulnerabilities | IEEE Security and Privacy | 2011 | 532 |
11 | Data Security in the World of Cloud Computing | IEEE Security and Privacy | 2009 | 518 |
12 | Smart-grid security issues | IEEE Security and Privacy | 2010 | 503 |
13 | Password memorability and security: empirical results | IEEE Security and Privacy | 2004 | 463 |
14 | Understanding Android Security | IEEE Security and Privacy | 2009 | 411 |
15 | Common Vulnerability Scoring System | IEEE Security and Privacy | 2006 | 383 |
16 | Side Channels in Cloud Services: Deduplication in Cloud Storage | IEEE Security and Privacy | 2010 | 375 |
17 | RFID Privacy: An Overview of Problems and Proposed Solutions | IEEE Security and Privacy | 2005 | 368 |
18 | A survey of secure wireless ad hoc routing | IEEE Security and Privacy | 2004 | 344 |
19 | Software security | IEEE Security and Privacy | 2004 | 334 |
20 | The Honeynet Project: trapping the hackers | IEEE Security and Privacy | 2003 | 295 |
21 | Google Android: A Comprehensive Security Assessment | IEEE Security and Privacy | 2010 | 276 |
22 | Secret-ballot receipts: true voter-verifiable elections | IEEE Security and Privacy | 2004 | 265 |
23 | Using Entropy Analysis to Find Encrypted and Packed Malware | IEEE Security and Privacy | 2007 | 262 |
24 | A First Look at Identity Management Schemes on the Blockchain | IEEE Security and Privacy | 2018 | 261 |
25 | Static analysis for security | IEEE Security and Privacy | 2004 | 260 |
26 | Man-in-the-Middle Attack to the HTTPS Protocol | IEEE Security and Privacy | 2009 | 245 |
27 | What Anyone Can Know: The Privacy Risks of Social Networking Sites | IEEE Security and Privacy | 2007 | 241 |
28 | Privacy-Preserving Machine Learning: Threats and Solutions | IEEE Security and Privacy | 2019 | 237 |
29 | Inferring Personal Information from Demand-Response Systems | IEEE Security and Privacy | 2010 | 232 |
30 | The spread of the Witty worm | IEEE Security and Privacy | 2004 | 227 |
31 | Blockchain Access Privacy: Challenges and Directions | IEEE Security and Privacy | 2018 | 205 |
32 | Low-Energy Security: Limits and Opportunities in the Internet of Things | IEEE Security and Privacy | 2015 | 204 |
33 | Is Bitcoin a Decentralized Currency? | IEEE Security and Privacy | 2014 | 200 |
34 | Big Data Analytics for Security | IEEE Security and Privacy | 2013 | 195 |
35 | Typing patterns: a key to user identification | IEEE Security and Privacy | 2004 | 193 |
36 | Is finding security holes a good idea? | IEEE Security and Privacy | 2005 | 190 |
37 | Enabling Video Privacy through Computer Vision | IEEE Security and Privacy | 2005 | 184 |
38 | Software penetration testing | IEEE Security and Privacy | 2005 | 184 |
39 | Going Spear Phishing: Exploring Embedded Training and Awareness | IEEE Security and Privacy | 2014 | 178 |
40 | Protecting privacy in continuous location-tracking applications | IEEE Security and Privacy | 2004 | 174 |
41 | Ethics and Privacy in AI and Big Data: Implementing Responsible Research and Innovation | IEEE Security and Privacy | 2018 | 173 |
42 | Overview of IEEE 802.16 security | IEEE Security and Privacy | 2004 | 163 |
43 | Cybersecurity in an Era with Quantum Computers: Will We Be Ready? | IEEE Security and Privacy | 2018 | 159 |
44 | Software security testing | IEEE Security and Privacy | 2004 | 156 |
45 | A Research Agenda Acknowledging the Persistence of Passwords | IEEE Security and Privacy | 2012 | 155 |
46 | Finding Focus in the Blur of Moving-Target Techniques | IEEE Security and Privacy | 2014 | 154 |
47 | Valuating Privacy | IEEE Security and Privacy | 2005 | 153 |
48 | Privacy Interests in Prescription Data, Part 2: Patient Privacy | IEEE Security and Privacy | 2009 | 151 |
49 | Obfuscation: The Hidden Malware | IEEE Security and Privacy | 2011 | 151 |
50 | The Venn of Identity: Options and Issues in Federated Identity Management | IEEE Security and Privacy | 2008 | 148 |