6.1(top 5%)
impact factor
300(top 50%)
papers
7.7K(top 20%)
citations
46(top 20%)
h-index
6.3(top 5%)
extended IF
303
all documents
8.1K
doc citations
69(top 20%)
g-index

Top Articles

#TitleJournalYearCitations
1A state-of-the-art survey of malware detection approaches using data mining techniquesHuman-centric Computing and Information Sciences2018241
2"Intelligent Environments: a manifesto"Human-centric Computing and Information Sciences2013202
3A survey of black hole attacks in wireless mobile ad hoc networksHuman-centric Computing and Information Sciences2011162
4Developing an online hate classifier for multiple social media platformsHuman-centric Computing and Information Sciences2020162
5A novel energy-aware cluster head selection based on particle swarm optimization for wireless sensor networksHuman-centric Computing and Information Sciences2012142
6Research paper classification systems based on TF-IDF and LDA schemesHuman-centric Computing and Information Sciences2019137
7Detecting misinformation in online social networks using cognitive psychologyHuman-centric Computing and Information Sciences2014133
8The shift to 6G communications: vision and requirementsHuman-centric Computing and Information Sciences2020130
9Indoor positioning and wayfinding systems: a surveyHuman-centric Computing and Information Sciences2020127
10An empower hamilton loop based data collection algorithm with mobile agent for WSNsHuman-centric Computing and Information Sciences2019120
11Optimization of sentiment analysis using machine learning classifiersHuman-centric Computing and Information Sciences2017105
12Organization and exploration of heterogeneous personal data collected in daily lifeHuman-centric Computing and Information Sciences2012102
13An enhanced security framework for home appliances in smart homeHuman-centric Computing and Information Sciences201790
14A collaborative healthcare framework for shared healthcare plan with ambient intelligenceHuman-centric Computing and Information Sciences202089
15Trust-based recommendation systems in Internet of Things: a systematic literature reviewHuman-centric Computing and Information Sciences201988
16Intelligent phishing url detection using association rule miningHuman-centric Computing and Information Sciences201687
17An energy-efficient sleep scheduling mechanism with similarity measure for wireless sensor networksHuman-centric Computing and Information Sciences201887
18A blockchain-based smart home gateway architecture for preventing data forgeryHuman-centric Computing and Information Sciences202084
19Mobile payment in Fintech environment: trends, security challenges, and servicesHuman-centric Computing and Information Sciences201880
20CIoT-Net: a scalable cognitive IoT based smart city network architectureHuman-centric Computing and Information Sciences201980
21Quality of service provision in mobile multimedia - a surveyHuman-centric Computing and Information Sciences201179
22A novel lightweight URL phishing detection system using SVM and similarity indexHuman-centric Computing and Information Sciences201778
23IoT + AR: pervasive and augmented environments for “Digi-log” shopping experienceHuman-centric Computing and Information Sciences201972
24Publishing and discovering context-dependent servicesHuman-centric Computing and Information Sciences201370
25A survey of cloud-based network intrusion detection analysisHuman-centric Computing and Information Sciences201669
26Baiting the hook: factors impacting susceptibility to phishing attacksHuman-centric Computing and Information Sciences201666
273D face recognition: a surveyHuman-centric Computing and Information Sciences201863
28Exploring the support for high performance applications in the container runtime environmentHuman-centric Computing and Information Sciences201862
29Exploring the affective, motivational and cognitive effects of pedagogical agent enthusiasm in a multimedia learning environmentHuman-centric Computing and Information Sciences201761
30Reliability and high availability in cloud computing environments: a reference roadmapHuman-centric Computing and Information Sciences201861
31Secure Authentication-Management human-centric Scheme for trusting personal resource information on mobile cloud computing with blockchainHuman-centric Computing and Information Sciences201860
32Performance evaluation of data aggregation for cluster-based wireless sensor networkHuman-centric Computing and Information Sciences201358
33Detection and classification of social media-based extremist affiliations using sentiment analysis techniquesHuman-centric Computing and Information Sciences201958
34Random forest and WiFi fingerprint-based indoor location recognition system using smart watchHuman-centric Computing and Information Sciences201958
35Intention awareness: improving upon situation awareness in human-centric environmentsHuman-centric Computing and Information Sciences201356
36A slave ants based ant colony optimization algorithm for task scheduling in cloud computing environmentsHuman-centric Computing and Information Sciences201756
37Personality classification based on profiles of social networks’ users and the five-factor model of personalityHuman-centric Computing and Information Sciences201856
38Parameterized algorithms of fundamental NP-hard problems: a surveyHuman-centric Computing and Information Sciences202054
39Monitoring of the daily living activities in smart home careHuman-centric Computing and Information Sciences201753
40A multilevel features selection framework for skin lesion classificationHuman-centric Computing and Information Sciences202050
41Multiple Kinect based system to monitor and analyze key performance indicators of physical trainingHuman-centric Computing and Information Sciences202050
42Integrating body language movements in augmented reality learning environmentHuman-centric Computing and Information Sciences201149
43Augmented reality applications for cultural heritage using KinectHuman-centric Computing and Information Sciences201549
44Medium Access Control (MAC) for Wireless Body Area Network (WBAN): Superframe structure, multiple access technique, taxonomy, and challengesHuman-centric Computing and Information Sciences201748
45Implications of E-learning systems and self-efficiency on students outcomes: a model approachHuman-centric Computing and Information Sciences201247
46Design and test bed experiments of server operation system using virtualization technologyHuman-centric Computing and Information Sciences201647
47Attack detection in water distribution systems using machine learningHuman-centric Computing and Information Sciences201947
48An indoor augmented-reality evacuation system for the Smartphone using personalized PedometryHuman-centric Computing and Information Sciences201246
49Feature extraction for robust physical activity recognitionHuman-centric Computing and Information Sciences201746
50Don’t click: towards an effective anti-phishing training. A comparative literature reviewHuman-centric Computing and Information Sciences202045