About
Technology
Issues
FAQ
Search
Scientometrics
Impact Factor
Discipline Ranks
h
-index
g
-index
Articles
Citations
Article Citations
Citation Distribution
Overviews
Top Institutions
Top Schools
Top Authors
Prolific Authors
Top Articles
Citing Bodies
Top Citing Authors
Top Citing Institutions
Top Citing Schools
Top Citing Journals
Top Citing Disciplines
exaly
›
Journals
›
Computer Fraud and Security
›
top-articles
Computer Fraud and Security
1.4
(top 50%)
impact factor
2.8K
(top 10%)
papers
8.4K
(top 20%)
citations
34
(top 20%)
h
-index
1.7
(top 50%)
extended IF
4.4K
all documents
9.2K
doc citations
54
(top 20%)
g
-index
Top Articles
#
Title
Journal
Year
Citations
1
World Economic Forum: Global Risks Report 2019
Computer Fraud and Security
2019
249
2
Location-based authentication: Grounding cyberspace for better security
Computer Fraud and Security
1996
144
3
Verizon: Data Breach Investigations Report 2020
Computer Fraud and Security
2020
137
4
The problem with Bitcoin
Computer Fraud and Security
2013
126
5
Verizon: 2019 Data Breach Investigations Report
Computer Fraud and Security
2019
116
6
Cultivating an organizational information security culture
Computer Fraud and Security
2006
102
7
IBM: Cost of a Data Breach Report
Computer Fraud and Security
2021
96
8
Verizon: 2021 Data Breach Investigations Report
Computer Fraud and Security
2021
82
9
From culture to disobedience: Recognising the varying user acceptance of IT security
Computer Fraud and Security
2009
75
10
APWG: Phishing Activity Trends Report Q4 2018
Computer Fraud and Security
2019
75
11
Digital forensics: the missing piece of the Internet of Things promise
Computer Fraud and Security
2016
73
12
Beyond Bitcoin: using blockchain technology to provide assurance in the commercial world
Computer Fraud and Security
2017
72
13
IBM: Cost of a Data Breach Report 2019
Computer Fraud and Security
2019
68
14
Information security architecture
Computer Fraud and Security
2005
67
15
Verizon: Data Breach Investigations Report
Computer Fraud and Security
2022
66
16
Recognising and addressing ‘security fatigue’
Computer Fraud and Security
2009
63
17
Trade secrets in software design and logic
Computer Fraud and Security
1998
54
18
Beyond the PIN: Enhancing user authentication for mobile devices
Computer Fraud and Security
2008
54
19
Ransomware: to pay or not to pay?
Computer Fraud and Security
2016
54
20
Cybercrime as a service: a very modern business
Computer Fraud and Security
2013
52
21
Protecting against spear-phishing
Computer Fraud and Security
2012
50
22
Phishing – challenges and solutions
Computer Fraud and Security
2018
50
23
Using feature generation from API calls for malware detection
Computer Fraud and Security
2014
49
24
The security issues of the Internet of Things
Computer Fraud and Security
2015
49
25
Malware detection by behavioural sequential patterns
Computer Fraud and Security
2013
46
26
Cyberterrorism — fact or fancy?
Computer Fraud and Security
1998
44
27
Using complexity metrics to improve software security
Computer Fraud and Security
2013
43
28
Best practices for BYOD security
Computer Fraud and Security
2014
43
29
Europol: Internet Organised Crime Threat Assessment (IOCTA) 2021
Computer Fraud and Security
2021
43
30
Identifying attack patterns for insider threat detection
Computer Fraud and Security
2015
41
31
Human aspects of information security in organisations
Computer Fraud and Security
2016
41
32
Deconstructing Flame: the limitations of traditional defences
Computer Fraud and Security
2012
39
33
Analysis of mobile payment security measures and different standards
Computer Fraud and Security
2007
37
34
Malvertising – exploiting web advertising
Computer Fraud and Security
2011
37
35
Understanding the influences on information security behaviour
Computer Fraud and Security
2012
37
36
Interview: BYOD and the enterprise network
Computer Fraud and Security
2012
36
37
Hackers Profiled — Who Are They and What Are Their Motivations?
Computer Fraud and Security
2001
35
38
Cloud computing – A question of trust
Computer Fraud and Security
2009
35
39
Bayesian inference – the future of online fraud protection
Computer Fraud and Security
2012
35
40
Crypto-jacking: how cyber-criminals are exploiting the crypto-currency boom
Computer Fraud and Security
2018
35
41
McAfee Labs Threats Report: December 2018
Computer Fraud and Security
2019
35
42
Public awareness and perceptions of biometrics
Computer Fraud and Security
2007
34
43
Home working and cyber security – an outbreak of unpreparedness?
Computer Fraud and Security
2020
34
44
KISS — Keep It Simple Stupid
Computer Fraud and Security
2004
33
45
Phishing: can we spot the signs?
Computer Fraud and Security
2007
32
46
Europol: Internet Organised Crime Threat Assessment (IOCTA) 2019
Computer Fraud and Security
2019
32
47
IBM: X-Force Threat Intelligence Index
Computer Fraud and Security
2022
32
48
Securing the next generation: enhancing e-safety awareness among young people
Computer Fraud and Security
2009
31
49
Fraud in mobile networks
Computer Fraud and Security
2013
31
50
Plugging the cyber-security skills gap
Computer Fraud and Security
2013
30
site/software ©
exaly
; All materials licenced under
CC by-SA
.