1.3(top 50%)
impact factor
556(top 50%)
papers
5.1K(top 20%)
citations
35(top 20%)
h-index
1.4(top 50%)
impact factor
635
all documents
5.4K
doc citations
58(top 20%)
g-index

Top Articles

#TitleJournalYearCitations
1Detection of malicious code by applying machine learning classifiers on static features: A state-of-the-art surveyInformation Security Technical Report2009242
2Spoofing and Anti-Spoofing MeasuresInformation Security Technical Report2002227
3Human factors in information security: The insider threat – Who can you trust these days?Information Security Technical Report2009196
4Information Security management: A human challenge?Information Security Technical Report2008132
5Continuous keystroke dynamics: A different perspective towards biometric evaluationInformation Security Technical Report2012127
6Assessing insider threats to information security using technical, behavioural and organisational measuresInformation Security Technical Report201098
7Privacy-enhancing identity managementInformation Security Technical Report200497
8Connectivity models of interdependency in mixed-type critical infrastructure networksInformation Security Technical Report200796
9Data mining and machine learning—Towards reducing false positives in intrusion detectionInformation Security Technical Report200589
10Information security management standards: Compliance, governance and risk managementInformation Security Technical Report200884
11RFID securityInformation Security Technical Report200481
12The positive outcomes of information security awareness training in companies – A case studyInformation Security Technical Report200971
13Attacking smart card systems: Theory and practiceInformation Security Technical Report200970
14AEGIS: A single-chip secure processorInformation Security Technical Report200569
15Using IT governance and COBIT to deliver value with IT and respond to legal, regulatory and compliance challengesInformation Security Technical Report200669
16Dealing with software viruses: A biological paradigmInformation Security Technical Report200768
17Informational privacy, consent and the “control” of personal dataInformation Security Technical Report200965
18Intrusion Detection Systems and Intrusion Prevention SystemsInformation Security Technical Report200563
19Trust in the CloudInformation Security Technical Report201162
20XML-based access control languagesInformation Security Technical Report200460
21Elliptic curve cryptosystem — The answer to strong, fast public-key cryptography for securing constrained environmentsInformation Security Technical Report199754
22Defending against cache-based side-channel attacksInformation Security Technical Report200354
23A comparison between traditional public key infrastructures and identity-based cryptographyInformation Security Technical Report200352
24Security in the Semantic Web using OWLInformation Security Technical Report200552
25National e-ID card schemes: A European overviewInformation Security Technical Report200847
26Information Security GovernanceInformation Security Technical Report200146
27Adaptive real-time anomaly detection with incremental clusteringInformation Security Technical Report200746
28Young people, disclosure of personal information and online privacy: Control, choice and consequencesInformation Security Technical Report200944
29Recognizing people by their iris patternsInformation Security Technical Report199843
30Security-by-contract on the .NET platformInformation Security Technical Report200842
31Commentary : Cloud computing – A security problem or solution?Information Security Technical Report201141
32Internet cloud security: The illusion of inclusionInformation Security Technical Report201138
33Sensing danger: Innate immunology for intrusion detectionInformation Security Technical Report200737
34In a ‘trusting’ environment, everyone is responsible for information securityInformation Security Technical Report200837
35What is a VPN?Information Security Technical Report200136
36ISMS, security standards and security regulationsInformation Security Technical Report200636
37Kynoid: Real-time enforcement of fine-grained, user-defined, and data-centric security policies for AndroidInformation Security Technical Report201336
38New Advances in Automatic Gait RecognitionInformation Security Technical Report200235
39Social networking and the risk to companies and institutionsInformation Security Technical Report201035
40Cloud security technologiesInformation Security Technical Report200934
41Introduction to XML Encryption and XML SignatureInformation Security Technical Report200433
42Information security management: An entangled research challengeInformation Security Technical Report200933
43Multiapplication smart card: Towards an open smart card?Information Security Technical Report200933
44Security for Workflow SystemsInformation Security Technical Report200132
45Penetration testing and social engineeringInformation Security Technical Report200332
46The role of Wireless Sensor Networks in the area of Critical Information Infrastructure ProtectionInformation Security Technical Report200732
47Cryptography from Pairings: A Snapshot of Current ResearchInformation Security Technical Report200231
48Securing Web applicationsInformation Security Technical Report200831
49An extensible analysable system modelInformation Security Technical Report200831
50An overview of fingerprint verification technologiesInformation Security Technical Report199830