About
Technology
Issues
FAQ
Search
Scientometrics
Impact Factor
Discipline Ranks
h
-index
g
-index
Articles
Citations
Article Citations
Citation Distribution
Overviews
Top Institutions
Top Schools
Top Authors
Prolific Authors
Top Articles
Citing Bodies
Top Citing Authors
Top Citing Institutions
Top Citing Schools
Top Citing Journals
Top Citing Disciplines
exaly
›
Journals
›
IEEE Transactions on Dependable and Secure Computing
›
top-articles
IEEE Transactions on Dependable and Secure Computing
5.6
(top 5%)
impact factor
2.2K
(top 10%)
papers
46.4K
(top 10%)
citations
96
(top 5%)
h
-index
5.7
(top 5%)
extended IF
2.4K
all documents
48.7K
doc citations
158
(top 5%)
g
-index
Top Articles
#
Title
Journal
Year
Citations
1
Basic concepts and taxonomy of dependable and secure computing
IEEE Transactions on Dependable and Secure Computing
2004
3,670
2
Security and Privacy in Decentralized Energy Trading Through Multi-Signatures, Blockchain and Anonymous Messaging Streams
IEEE Transactions on Dependable and Secure Computing
2018
895
3
Detecting Automation of Twitter Accounts: Are You a Human, Bot, or Cyborg?
IEEE Transactions on Dependable and Secure Computing
2012
464
4
Dynamic Security Risk Management Using Bayesian Attack Graphs
IEEE Transactions on Dependable and Secure Computing
2012
457
5
Characterization of soft errors caused by single event upsets in CMOS processes
IEEE Transactions on Dependable and Secure Computing
2004
416
6
A Large-Scale Study of Failures in High-Performance Computing Systems
IEEE Transactions on Dependable and Secure Computing
2010
403
7
SASI: A New Ultralightweight RFID Authentication Protocol Providing Strong Authentication and Strong Integrity
IEEE Transactions on Dependable and Secure Computing
2007
384
8
Model-based evaluation: from dependability to security
IEEE Transactions on Dependable and Secure Computing
2004
375
9
Anonymous Two-Factor Authentication in Distributed Systems: Certain Goals Are Beyond Attainment
IEEE Transactions on Dependable and Secure Computing
2015
348
10
Comprehensive approach to intrusion detection alert correlation
IEEE Transactions on Dependable and Secure Computing
2004
325
11
Credit Card Fraud Detection Using Hidden Markov Model
IEEE Transactions on Dependable and Secure Computing
2008
324
12
Database security - concepts, approaches, and challenges
IEEE Transactions on Dependable and Secure Computing
2005
293
13
Trust-Based Service Management for Social Internet of Things Systems
IEEE Transactions on Dependable and Secure Computing
2016
289
14
MADAM: Effective and Efficient Behavior-based Android Malware Detection and Prevention
IEEE Transactions on Dependable and Secure Computing
2018
282
15
A New Biometric Technology Based on Mouse Dynamics
IEEE Transactions on Dependable and Secure Computing
2007
281
16
NICE: Network Intrusion Detection and Countermeasure Selection in Virtual Network Systems
IEEE Transactions on Dependable and Secure Computing
2013
244
17
Collective Data-Sanitization for Preventing Sensitive Information Inference Attacks in Social Networks
IEEE Transactions on Dependable and Secure Computing
2016
236
18
Secure Remote User Authenticated Key Establishment Protocol for Smart Home Environment
IEEE Transactions on Dependable and Secure Computing
2020
230
19
Enabling Fine-Grained Multi-Keyword Search Supporting Classified Sub-Dictionaries over Encrypted Cloud Data
IEEE Transactions on Dependable and Secure Computing
2016
228
20
DeepChain: Auditable and Privacy-Preserving Deep Learning with Blockchain-based Incentive
IEEE Transactions on Dependable and Secure Computing
2019
226
21
New Publicly Verifiable Databases with Efficient Updates
IEEE Transactions on Dependable and Secure Computing
2015
210
22
Detecting Phishing Web Pages with Visual Similarity Assessment Based on Earth Mover's Distance (EMD)
IEEE Transactions on Dependable and Secure Computing
2006
208
23
An Obfuscation-Based Approach for Protecting Location Privacy
IEEE Transactions on Dependable and Secure Computing
2011
193
24
Change-point monitoring for the detection of DoS attacks
IEEE Transactions on Dependable and Secure Computing
2004
183
25
Dependable Structural Health Monitoring Using Wireless Sensor Networks
IEEE Transactions on Dependable and Secure Computing
2017
178
26
Cloud Centric Authentication for Wearable Healthcare Monitoring System
IEEE Transactions on Dependable and Secure Computing
2020
178
27
PA-CRT: Chinese Remainder Theorem Based Conditional Privacy-Preserving Authentication Scheme in Vehicular Ad-Hoc Networks
IEEE Transactions on Dependable and Secure Computing
2021
178
28
Two Birds with One Stone: Two-Factor Authentication with Security Beyond Conventional Bound
IEEE Transactions on Dependable and Secure Computing
2016
177
29
Block Design-Based Key Agreement for Group Data Sharing in Cloud Computing
IEEE Transactions on Dependable and Secure Computing
2019
175
30
An Advanced Hybrid Peer-to-Peer Botnet
IEEE Transactions on Dependable and Secure Computing
2010
171
31
SecuredTrust: A Dynamic Trust Computation Model for Secured Communication in Multiagent Systems
IEEE Transactions on Dependable and Secure Computing
2012
171
32
Building PUF Based Authentication and Key Exchange Protocol for IoT Without Explicit CRPs in Verifier Database
IEEE Transactions on Dependable and Secure Computing
2019
171
33
Modeling and Simulation Study of the Propagation and Defense of Internet E-mail Worms
IEEE Transactions on Dependable and Secure Computing
2007
169
34
A Novel Approach for Phase-Type Fitting with the EM Algorithm
IEEE Transactions on Dependable and Secure Computing
2006
167
35
Behavior Rule Specification-Based Intrusion Detection for Safety Critical Medical Cyber Physical Systems
IEEE Transactions on Dependable and Secure Computing
2015
166
36
Architecture-Based Software Reliability Analysis: Overview and Limitations
IEEE Transactions on Dependable and Secure Computing
2007
165
37
Fuzzy Identity-Based Data Integrity Auditing for Reliable Cloud Storage Systems
IEEE Transactions on Dependable and Secure Computing
2019
165
38
SySeVR: A Framework for Using Deep Learning to Detect Software Vulnerabilities
IEEE Transactions on Dependable and Secure Computing
2022
165
39
Secure Overlay Cloud Storage with Access Control and Assured Deletion
IEEE Transactions on Dependable and Secure Computing
2012
164
40
Fast Byzantine Consensus
IEEE Transactions on Dependable and Secure Computing
2006
163
41
ReStore: Symptom-Based Soft Error Detection in Microprocessors
IEEE Transactions on Dependable and Secure Computing
2006
162
42
A New Decision-Diagram-Based Method for Efficient Analysis on Multistate Systems
IEEE Transactions on Dependable and Secure Computing
2009
162
43
A Key Predistribution Scheme for Sensor Networks Using Deployment Knowledge
IEEE Transactions on Dependable and Secure Computing
2006
160
44
D-WARD: A Source-End Defense against Flooding Denial-of-Service Attacks
IEEE Transactions on Dependable and Secure Computing
2005
159
45
Securing Mobile Ad Hoc Networks with Certificateless Public Keys
IEEE Transactions on Dependable and Secure Computing
2006
158
46
Design and Implementation of TARF: A Trust-Aware Routing Framework for WSNs
IEEE Transactions on Dependable and Secure Computing
2012
155
47
Privacy Leakage of Location Sharing in Mobile Social Networks: Attacks and Defense
IEEE Transactions on Dependable and Secure Computing
2018
154
48
Secure Biometric-Based Authentication Scheme Using Chebyshev Chaotic Map for Multi-Server Environment
IEEE Transactions on Dependable and Secure Computing
2018
154
49
WarningBird: A Near Real-Time Detection System for Suspicious URLs in Twitter Stream
IEEE Transactions on Dependable and Secure Computing
2013
148
50
Checkpointing for peta-scale systems: a look into the future of practical rollback-recovery
IEEE Transactions on Dependable and Secure Computing
2004
143
site/software ©
exaly
; All materials licenced under
CC by-SA
.