1.2(top 50%)
impact factor
1.7K(top 10%)
papers
9.0K(top 20%)
citations
35(top 20%)
h-index
3.6(top 10%)
extended IF
4.4K
all documents
9.9K
doc citations
56(top 20%)
g-index

Top Articles

#TitleJournalYearCitations
1World Economic Forum: Global Risks Report 2019Computer Fraud and Security2019292
2Verizon: Data Breach Investigations Report 2020Computer Fraud and Security2020151
3Location-based authentication: Grounding cyberspace for better securityComputer Fraud and Security1996144
4Verizon: 2019 Data Breach Investigations ReportComputer Fraud and Security2019134
5The problem with BitcoinComputer Fraud and Security2013126
6Verizon: 2021 Data Breach Investigations ReportComputer Fraud and Security2021110
7IBM: Cost of a Data Breach ReportComputer Fraud and Security2021107
8Cultivating an organizational information security cultureComputer Fraud and Security2006103
9Verizon: Data Breach Investigations ReportComputer Fraud and Security202289
10APWG: Phishing Activity Trends Report Q4 2018Computer Fraud and Security201977
11From culture to disobedience: Recognising the varying user acceptance of IT securityComputer Fraud and Security200976
12Digital forensics: the missing piece of the Internet of Things promiseComputer Fraud and Security201674
13Beyond Bitcoin: using blockchain technology to provide assurance in the commercial worldComputer Fraud and Security201773
14IBM: Cost of a Data Breach Report 2019Computer Fraud and Security201971
15Information security architectureComputer Fraud and Security200567
16Recognising and addressing ‘security fatigue’Computer Fraud and Security200966
17Cybercrime as a service: a very modern businessComputer Fraud and Security201360
18Phishing – challenges and solutionsComputer Fraud and Security201857
19Ransomware: to pay or not to pay?Computer Fraud and Security201656
20Trade secrets in software design and logicComputer Fraud and Security199854
21Beyond the PIN: Enhancing user authentication for mobile devicesComputer Fraud and Security200854
22Protecting against spear-phishingComputer Fraud and Security201252
23Using feature generation from API calls for malware detectionComputer Fraud and Security201451
24The security issues of the Internet of ThingsComputer Fraud and Security201550
25Human aspects of information security in organisationsComputer Fraud and Security201649
26Europol: Internet Organised Crime Threat Assessment (IOCTA) 2021Computer Fraud and Security202149
27Cyberterrorism — fact or fancy?Computer Fraud and Security199846
28Malware detection by behavioural sequential patternsComputer Fraud and Security201346
29Using complexity metrics to improve software securityComputer Fraud and Security201344
30Best practices for BYOD securityComputer Fraud and Security201443
31Identifying attack patterns for insider threat detectionComputer Fraud and Security201541
32McAfee Labs Threats Report: December 2018Computer Fraud and Security201941
33Malvertising – exploiting web advertisingComputer Fraud and Security201139
34Understanding the influences on information security behaviourComputer Fraud and Security201239
35Deconstructing Flame: the limitations of traditional defencesComputer Fraud and Security201239
36Home working and cyber security – an outbreak of unpreparedness?Computer Fraud and Security202039
37KISS — Keep It Simple StupidComputer Fraud and Security200438
38Analysis of mobile payment security measures and different standardsComputer Fraud and Security200738
39IBM: X-Force Threat Intelligence IndexComputer Fraud and Security202238
40Hackers Profiled — Who Are They and What Are Their Motivations?Computer Fraud and Security200135
41Cloud computing – A question of trustComputer Fraud and Security200935
42Bayesian inference – the future of online fraud protectionComputer Fraud and Security201235
43Crypto-jacking: how cyber-criminals are exploiting the crypto-currency boomComputer Fraud and Security201835
44Public awareness and perceptions of biometricsComputer Fraud and Security200734
45Phishing: can we spot the signs?Computer Fraud and Security200734
46Can't get the staff? The growing need for cyber-security skillsComputer Fraud and Security201734
47Europol: Internet Organised Crime Threat Assessment (IOCTA) 2019Computer Fraud and Security201934
48Securing the next generation: enhancing e-safety awareness among young peopleComputer Fraud and Security200932
49Online recruitment services: another playground for fraudstersComputer Fraud and Security201632
50Cisco: 2020 CISO Benchmark ReportComputer Fraud and Security202032