1.4(top 50%)
impact factor
2.8K(top 10%)
papers
8.4K(top 20%)
citations
34(top 20%)
h-index
1.7(top 50%)
extended IF
4.4K
all documents
9.2K
doc citations
54(top 20%)
g-index

Top Articles

#TitleJournalYearCitations
1World Economic Forum: Global Risks Report 2019Computer Fraud and Security2019249
2Location-based authentication: Grounding cyberspace for better securityComputer Fraud and Security1996144
3Verizon: Data Breach Investigations Report 2020Computer Fraud and Security2020137
4The problem with BitcoinComputer Fraud and Security2013126
5Verizon: 2019 Data Breach Investigations ReportComputer Fraud and Security2019116
6Cultivating an organizational information security cultureComputer Fraud and Security2006102
7IBM: Cost of a Data Breach ReportComputer Fraud and Security202196
8Verizon: 2021 Data Breach Investigations ReportComputer Fraud and Security202182
9From culture to disobedience: Recognising the varying user acceptance of IT securityComputer Fraud and Security200975
10APWG: Phishing Activity Trends Report Q4 2018Computer Fraud and Security201975
11Digital forensics: the missing piece of the Internet of Things promiseComputer Fraud and Security201673
12Beyond Bitcoin: using blockchain technology to provide assurance in the commercial worldComputer Fraud and Security201772
13IBM: Cost of a Data Breach Report 2019Computer Fraud and Security201968
14Information security architectureComputer Fraud and Security200567
15Verizon: Data Breach Investigations ReportComputer Fraud and Security202266
16Recognising and addressing ‘security fatigue’Computer Fraud and Security200963
17Trade secrets in software design and logicComputer Fraud and Security199854
18Beyond the PIN: Enhancing user authentication for mobile devicesComputer Fraud and Security200854
19Ransomware: to pay or not to pay?Computer Fraud and Security201654
20Cybercrime as a service: a very modern businessComputer Fraud and Security201352
21Protecting against spear-phishingComputer Fraud and Security201250
22Phishing – challenges and solutionsComputer Fraud and Security201850
23Using feature generation from API calls for malware detectionComputer Fraud and Security201449
24The security issues of the Internet of ThingsComputer Fraud and Security201549
25Malware detection by behavioural sequential patternsComputer Fraud and Security201346
26Cyberterrorism — fact or fancy?Computer Fraud and Security199844
27Using complexity metrics to improve software securityComputer Fraud and Security201343
28Best practices for BYOD securityComputer Fraud and Security201443
29Europol: Internet Organised Crime Threat Assessment (IOCTA) 2021Computer Fraud and Security202143
30Identifying attack patterns for insider threat detectionComputer Fraud and Security201541
31Human aspects of information security in organisationsComputer Fraud and Security201641
32Deconstructing Flame: the limitations of traditional defencesComputer Fraud and Security201239
33Analysis of mobile payment security measures and different standardsComputer Fraud and Security200737
34Malvertising – exploiting web advertisingComputer Fraud and Security201137
35Understanding the influences on information security behaviourComputer Fraud and Security201237
36Interview: BYOD and the enterprise networkComputer Fraud and Security201236
37Hackers Profiled — Who Are They and What Are Their Motivations?Computer Fraud and Security200135
38Cloud computing – A question of trustComputer Fraud and Security200935
39Bayesian inference – the future of online fraud protectionComputer Fraud and Security201235
40Crypto-jacking: how cyber-criminals are exploiting the crypto-currency boomComputer Fraud and Security201835
41McAfee Labs Threats Report: December 2018Computer Fraud and Security201935
42Public awareness and perceptions of biometricsComputer Fraud and Security200734
43Home working and cyber security – an outbreak of unpreparedness?Computer Fraud and Security202034
44KISS — Keep It Simple StupidComputer Fraud and Security200433
45Phishing: can we spot the signs?Computer Fraud and Security200732
46Europol: Internet Organised Crime Threat Assessment (IOCTA) 2019Computer Fraud and Security201932
47IBM: X-Force Threat Intelligence IndexComputer Fraud and Security202232
48Securing the next generation: enhancing e-safety awareness among young peopleComputer Fraud and Security200931
49Fraud in mobile networksComputer Fraud and Security201331
50Plugging the cyber-security skills gapComputer Fraud and Security201330