0.3(top 100%)
impact factor
1.4K(top 20%)
papers
2.9K(top 20%)
citations
18(top 50%)
h-index
0.4(top 50%)
impact factor
3.0K
all documents
3.3K
doc citations
37(top 20%)
g-index

Top Articles

#TitleJournalYearCitations
1Information Hiding Techniques for Steganography and Digital WatermakingEdpacs2000300
2VLSI Electronics Microstructure ScienceEdpacs1985221
3Formation and Characterization of Transition-Metal SilicidesEdpacs1983120
4Information Warfare And SecurityEdpacs2000110
5Approaches to ScalingEdpacs198966
6Network Intrusion Detection: An Analyst's Hand-bookEdpacs200059
7Hot-Carrier EffectsEdpacs198942
8ISO 31000 Risk Management— “The Gold Standard”Edpacs201231
9Handbook of Information Security ManagementEdpacs199827
10Microelectronic Test Chips for VLSI ElectronicsEdpacs198326
11Early Warning Signs of it Project Failure: The Dominant DozenEdpacs200726
12IN SEARCH OF A MEASURE OF EFFECTIVENESS FOR INTERNAL AUDIT FUNCTIONS: AN INSTITUTIONAL PERSPECTIVEEdpacs201825
13Web Security SourcebookEdpacs199824
14Internet And Intranet SecurityEdpacs200023
15Internal Audit Effectiveness: Multiple Case Study Research Involving Chief Audit Executives and Senior ManagementEdpacs201722
16Advanced MOS Device PhysicsEdpacs198922
17Heterostructure and Quantum Well PhysicsEdpacs199420
18Smart Card Security and ApplicationsEdpacs199820
19Risk Analysis and Risk ManagementEdpacs200419
20Corruption and Fraud Detection by Public Sector AuditorsEdpacs200719
21WHAT IS DIGITAL TRANSFORMATION?Edpacs202119
22Laser Direct Writing for VLSI* *This work was supported by the Defense Advanced Research Projects Agency, the Department of the Air Force (in part under a specific program sponsored by the Air Force Office of Scientific Research), and the Army Research Office.Edpacs198319
23Securing Wireless Sensor Networks: A SurveyEdpacs201318
24Mosfet Modeling for Circuit SimulationEdpacs198918
25Building Trust and Cooperation through Technology Adaptation in Virtual Teams: Empirical Field EvidenceEdpacs201017
26COBIT 5: Adding Value Through Effective GeitEdpacs201216
27Principles of Optical LithographyEdpacs198116
28Characteristics of Effective Security Governance1Edpacs200715
29BLOCKCHAIN AUDITING – ACCELERATING THE NEED FOR AUTOMATED AUDITS!Edpacs201915
30Basic Principles of Plasma Etching for Silicon DevicesEdpacs198414
31Views on Internal Audit, Internal Controls, and Internal Audit’s Use of TechnologyEdpacs201614
32The Proactive and Preventive Privacy (3P) Framework for IoT Privacy by DesignEdpacs201814
33COBIT 2019: A SIGNIFICANT UPDATEEdpacs201914
34Document Theft: Appropriate ResponsesEdpacs200413
35The Differential Performance Effects of Healthcare Information Technology AdoptionEdpacs201013
36Enabling Effective IT Governance: Leveraging ISO/IEC 38500:2008 and COBIT to Achieve Business–IT AlignmentEdpacs201113
37DoS-DDoS: TAXONOMIES OF ATTACKS, COUNTERMEASURES, AND WELL-KNOWN DEFENSE MECHANISMS IN CLOUD ENVIRONMENTEdpacs201813
38Harnessing Artificial Intelligence to Deliver Real-Time Intelligence and Business Process ImprovementsEdpacs201813
39Optical Linewidth Measurements on Photomasks and Wafers† †Contribution of the National Bureau of Standards; not subject to copyright.Edpacs198213
40Transient Response of Electron Transport in GaAs Using the Monte Carlo MethodEdpacs198213
41Nanometer-Scale Fabrication TechniquesEdpacs198213
42Lumped Parameter Model for Optical LithographyEdpacs198713
43Gallium-Arsenide TechnologyEdpacs198912
44Understanding Intrusion Detection SystemsEdpacs200112
45Commentary: Two Considerations in Applying Single User-IdEdpacs200212
46Social Engineering: Concepts and SolutionsEdpacs200612
47Real-Time Business Intelligence: Best Practices at Continental Airlines1Edpacs200912
48A comprehensive study on DNA based Security scheme Using Deep Learning in HealthcareEdpacs202212
49The Continuous Process Audit System: Knowledge Acquisition and RepresentationEdpacs199211
50Secure Electronic Transactions: Introduction and Technical ReferenceEdpacs199911