About
Technology
Issues
FAQ
Search
Profile
Top Authors
Prolific Authors
Top Journals
Main Disciplines
Main Topics
Most Cited Articles
Scientometrics
Avg Impact Factor
★★
Articles
★★★
Articles
Citing Bodies
Top Citing Authors
Top Citing Institutions
Top Citing Schools
Top Citing Journals
Top Citing Disciplines
exaly
›
Schools
›
Computer Science Department
›
top-articles
Computer Science Department
109
(top 1%)
papers
3.1K
(top 1%)
citations
24
(top 1%)
h
-index
55
(top 1%)
g
-index
161
all documents
3.6K
doc citations
695
citing journals
Top Articles
#
Title
Journal
Year
Citations
1
On the features and challenges of security and privacy in distributed internet of things
Computer Networks
2013
992
2
A Survey of IoT-Enabled Cyberattacks: Assessing Attack Paths to Critical Infrastructures and Services
IEEE Communications Surveys and Tutorials
2018
261
3
Key management systems for sensor networks in the context of the Internet of Things
Computers and Electrical Engineering
2011
243
4
Critical infrastructure protection: Requirements and challenges for the 21st century
International Journal of Critical Infrastructure Protection
2015
183
5
Real-time location and inpatient care systems based on passive RFID
Journal of Network and Computer Applications
2011
96
6
OCPP Protocol: Security Threats and Challenges
IEEE Transactions on Smart Grid
2017
89
7
A Survey of Cryptographic Primitives and Implementations for Hardware-Constrained Sensor Network Nodes
Mobile Networks and Applications
2007
85
8
Analysis of Security Threats, Requirements, Technologies and Standards in Wireless Sensor Networks
Lecture Notes in Computer Science
2009
68
9
Digital Twin: A Comprehensive Survey of Security Threats
IEEE Communications Surveys and Tutorials
2022
63
10
A study of the bi-objective next release problem
Empirical Software Engineering
2011
61
11
Proxy Re-Encryption: Analysis of constructions and its application to secure access delegation
Journal of Network and Computer Applications
2017
53
12
Why have public key infrastructures failed so far?
Internet Research
2005
40
13
Improved certificate-based encryption in the standard model
Journal of Systems and Software
2008
40
14
Selecting key management schemes for WSN applications
Computers and Security
2012
36
15
A Resilient Architecture for the Smart Grid
IEEE Transactions on Industrial Informatics
2018
36
16
Analysis of requirements for critical control systems
International Journal of Critical Infrastructure Protection
2012
35
17
Policy enforcement system for secure interoperable control in distributed Smart Grid systems
Journal of Network and Computer Applications
2016
35
18
Entity Name System: The Back-Bone of an Open and Scalable Web of Data
2008
34
19
Unleashing public-key cryptography in wireless sensor networks
Journal of Computer Security
2006
32
20
WASAM: A dynamic wide-area situational awareness model for critical domains in Smart Grids
Future Generation Computer Systems
2014
30
21
Analysis of location privacy solutions in wireless sensor networks
IET Communications
2011
29
22
Blockchain-assisted access for federated Smart Grid domains: Coupling and features
Journal of Parallel and Distributed Computing
2020
29
23
Security Aspects of SCADA and DCS Environments
Lecture Notes in Computer Science
2012
27
24
Smart control of operational threats in control substations
Computers and Security
2013
27
25
Certified electronic mail: Properties revisited
Computers and Security
2010
25
26
Managing Incidents in Smart Grids à la Cloud
2011
24
27
An Early Warning System Based on Reputation for Energy Control Systems
IEEE Transactions on Smart Grid
2011
24
28
Covert Channels-Based Stealth Attacks in Industry 4.0
IEEE Systems Journal
2019
24
29
Applying the semantic Web layers to access control
0
23
30
Immune System for the Internet of Things Using Edge Technologies
IEEE Internet of Things Journal
2019
23
31
Analysis of Secure Mobile Grid Systems: A systematic approach
Information and Software Technology
2010
21
32
Exploiting Context-Awareness to Enhance Source-Location Privacy in Wireless Sensor Networks
Computer Journal
2011
21
33
Distributed Identity Management Model for Digital Ecosystems
2007
20
34
Secure SCADA framework for the protection of energy control systems
Concurrency Computation Practice and Experience
2011
20
35
A framework for secure execution of software
International Journal of Information Security
2004
19
36
Specification and design of advanced authentication and authorization services
Computer Standards and Interfaces
2005
19
37
Fair Traceable Multi-Group Signatures
Lecture Notes in Computer Science
2008
19
38
Resilient interconnection in cyber-physical control systems
Computers and Security
2017
19
39
Anonymity 2.0 – X.509 Extensions Supporting Privacy-Friendly Authentication
2007
18
40
Analysis and taxonomy of security/QoS tradeoff solutions for the future internet
Security and Communication Networks
2014
16
41
Integration of a Threat Traceability Solution in the Industrial Internet of Things
IEEE Transactions on Industrial Informatics
2020
16
42
Towards a Business Process-Driven Framework for Security Engineering with the UML
Lecture Notes in Computer Science
2003
15
43
A metadata‐based access control model for web services
Internet Research
2005
15
44
A peer-to-peer multidimensional trust model for digital ecosystems
2008
15
45
A methodology for security assurance-driven system development
Requirements Engineering
2011
15
46
Applicability of Public Key Infrastructures in Wireless Sensor Networks
Lecture Notes in Computer Science
2007
15
47
Specification of a framework for the anonymous use of privileges
Telematics and Informatics
2006
14
48
Using Peer Review for Student Performance Enhancement: Experiences in a Multidisciplinary Higher Education Setting
Education Sciences
2021
14
49
A business process-driven approach to security engineering
0
13
50
Optimized multi‐party certified email protocols
Information Management and Computer Security
2005
13
site/software ©
exaly
; All materials licenced under
CC by-SA
.