5.6(top 5%)
impact factor
2.2K(top 10%)
papers
46.4K(top 10%)
citations
96(top 5%)
h-index
5.7(top 5%)
extended IF
2.4K
all documents
48.7K
doc citations
158(top 5%)
g-index

Top Articles

#TitleJournalYearCitations
1Basic concepts and taxonomy of dependable and secure computingIEEE Transactions on Dependable and Secure Computing20043,670
2Security and Privacy in Decentralized Energy Trading Through Multi-Signatures, Blockchain and Anonymous Messaging StreamsIEEE Transactions on Dependable and Secure Computing2018895
3Detecting Automation of Twitter Accounts: Are You a Human, Bot, or Cyborg?IEEE Transactions on Dependable and Secure Computing2012464
4Dynamic Security Risk Management Using Bayesian Attack GraphsIEEE Transactions on Dependable and Secure Computing2012457
5Characterization of soft errors caused by single event upsets in CMOS processesIEEE Transactions on Dependable and Secure Computing2004416
6A Large-Scale Study of Failures in High-Performance Computing SystemsIEEE Transactions on Dependable and Secure Computing2010403
7SASI: A New Ultralightweight RFID Authentication Protocol Providing Strong Authentication and Strong IntegrityIEEE Transactions on Dependable and Secure Computing2007384
8Model-based evaluation: from dependability to securityIEEE Transactions on Dependable and Secure Computing2004375
9Anonymous Two-Factor Authentication in Distributed Systems: Certain Goals Are Beyond AttainmentIEEE Transactions on Dependable and Secure Computing2015348
10Comprehensive approach to intrusion detection alert correlationIEEE Transactions on Dependable and Secure Computing2004325
11Credit Card Fraud Detection Using Hidden Markov ModelIEEE Transactions on Dependable and Secure Computing2008324
12Database security - concepts, approaches, and challengesIEEE Transactions on Dependable and Secure Computing2005293
13Trust-Based Service Management for Social Internet of Things SystemsIEEE Transactions on Dependable and Secure Computing2016289
14MADAM: Effective and Efficient Behavior-based Android Malware Detection and PreventionIEEE Transactions on Dependable and Secure Computing2018282
15A New Biometric Technology Based on Mouse DynamicsIEEE Transactions on Dependable and Secure Computing2007281
16NICE: Network Intrusion Detection and Countermeasure Selection in Virtual Network SystemsIEEE Transactions on Dependable and Secure Computing2013244
17Collective Data-Sanitization for Preventing Sensitive Information Inference Attacks in Social NetworksIEEE Transactions on Dependable and Secure Computing2016236
18Secure Remote User Authenticated Key Establishment Protocol for Smart Home EnvironmentIEEE Transactions on Dependable and Secure Computing2020230
19Enabling Fine-Grained Multi-Keyword Search Supporting Classified Sub-Dictionaries over Encrypted Cloud DataIEEE Transactions on Dependable and Secure Computing2016228
20DeepChain: Auditable and Privacy-Preserving Deep Learning with Blockchain-based IncentiveIEEE Transactions on Dependable and Secure Computing2019226
21New Publicly Verifiable Databases with Efficient UpdatesIEEE Transactions on Dependable and Secure Computing2015210
22Detecting Phishing Web Pages with Visual Similarity Assessment Based on Earth Mover's Distance (EMD)IEEE Transactions on Dependable and Secure Computing2006208
23An Obfuscation-Based Approach for Protecting Location PrivacyIEEE Transactions on Dependable and Secure Computing2011193
24Change-point monitoring for the detection of DoS attacksIEEE Transactions on Dependable and Secure Computing2004183
25Dependable Structural Health Monitoring Using Wireless Sensor NetworksIEEE Transactions on Dependable and Secure Computing2017178
26Cloud Centric Authentication for Wearable Healthcare Monitoring SystemIEEE Transactions on Dependable and Secure Computing2020178
27PA-CRT: Chinese Remainder Theorem Based Conditional Privacy-Preserving Authentication Scheme in Vehicular Ad-Hoc NetworksIEEE Transactions on Dependable and Secure Computing2021178
28Two Birds with One Stone: Two-Factor Authentication with Security Beyond Conventional BoundIEEE Transactions on Dependable and Secure Computing2016177
29Block Design-Based Key Agreement for Group Data Sharing in Cloud ComputingIEEE Transactions on Dependable and Secure Computing2019175
30An Advanced Hybrid Peer-to-Peer BotnetIEEE Transactions on Dependable and Secure Computing2010171
31SecuredTrust: A Dynamic Trust Computation Model for Secured Communication in Multiagent SystemsIEEE Transactions on Dependable and Secure Computing2012171
32Building PUF Based Authentication and Key Exchange Protocol for IoT Without Explicit CRPs in Verifier DatabaseIEEE Transactions on Dependable and Secure Computing2019171
33Modeling and Simulation Study of the Propagation and Defense of Internet E-mail WormsIEEE Transactions on Dependable and Secure Computing2007169
34A Novel Approach for Phase-Type Fitting with the EM AlgorithmIEEE Transactions on Dependable and Secure Computing2006167
35Behavior Rule Specification-Based Intrusion Detection for Safety Critical Medical Cyber Physical SystemsIEEE Transactions on Dependable and Secure Computing2015166
36Architecture-Based Software Reliability Analysis: Overview and LimitationsIEEE Transactions on Dependable and Secure Computing2007165
37Fuzzy Identity-Based Data Integrity Auditing for Reliable Cloud Storage SystemsIEEE Transactions on Dependable and Secure Computing2019165
38SySeVR: A Framework for Using Deep Learning to Detect Software VulnerabilitiesIEEE Transactions on Dependable and Secure Computing2022165
39Secure Overlay Cloud Storage with Access Control and Assured DeletionIEEE Transactions on Dependable and Secure Computing2012164
40Fast Byzantine ConsensusIEEE Transactions on Dependable and Secure Computing2006163
41ReStore: Symptom-Based Soft Error Detection in MicroprocessorsIEEE Transactions on Dependable and Secure Computing2006162
42A New Decision-Diagram-Based Method for Efficient Analysis on Multistate SystemsIEEE Transactions on Dependable and Secure Computing2009162
43A Key Predistribution Scheme for Sensor Networks Using Deployment KnowledgeIEEE Transactions on Dependable and Secure Computing2006160
44D-WARD: A Source-End Defense against Flooding Denial-of-Service AttacksIEEE Transactions on Dependable and Secure Computing2005159
45Securing Mobile Ad Hoc Networks with Certificateless Public KeysIEEE Transactions on Dependable and Secure Computing2006158
46Design and Implementation of TARF: A Trust-Aware Routing Framework for WSNsIEEE Transactions on Dependable and Secure Computing2012155
47Privacy Leakage of Location Sharing in Mobile Social Networks: Attacks and DefenseIEEE Transactions on Dependable and Secure Computing2018154
48Secure Biometric-Based Authentication Scheme Using Chebyshev Chaotic Map for Multi-Server EnvironmentIEEE Transactions on Dependable and Secure Computing2018154
49WarningBird: A Near Real-Time Detection System for Suspicious URLs in Twitter StreamIEEE Transactions on Dependable and Secure Computing2013148
50Checkpointing for peta-scale systems: a look into the future of practical rollback-recoveryIEEE Transactions on Dependable and Secure Computing2004143