109(top 1%)
papers
3.1K(top 1%)
citations
24(top 1%)
h-index
55(top 1%)
g-index
161
all documents
3.6K
doc citations
695
citing journals

Top Articles

#TitleJournalYearCitations
1On the features and challenges of security and privacy in distributed internet of thingsComputer Networks2013992
2A Survey of IoT-Enabled Cyberattacks: Assessing Attack Paths to Critical Infrastructures and ServicesIEEE Communications Surveys and Tutorials2018261
3Key management systems for sensor networks in the context of the Internet of ThingsComputers and Electrical Engineering2011243
4Critical infrastructure protection: Requirements and challenges for the 21st centuryInternational Journal of Critical Infrastructure Protection2015183
5Real-time location and inpatient care systems based on passive RFIDJournal of Network and Computer Applications201196
6OCPP Protocol: Security Threats and ChallengesIEEE Transactions on Smart Grid201789
7A Survey of Cryptographic Primitives and Implementations for Hardware-Constrained Sensor Network NodesMobile Networks and Applications200785
8Analysis of Security Threats, Requirements, Technologies and Standards in Wireless Sensor NetworksLecture Notes in Computer Science200968
9Digital Twin: A Comprehensive Survey of Security ThreatsIEEE Communications Surveys and Tutorials202263
10A study of the bi-objective next release problemEmpirical Software Engineering201161
11Proxy Re-Encryption: Analysis of constructions and its application to secure access delegationJournal of Network and Computer Applications201753
12Why have public key infrastructures failed so far?Internet Research200540
13Improved certificate-based encryption in the standard modelJournal of Systems and Software200840
14Selecting key management schemes for WSN applicationsComputers and Security201236
15A Resilient Architecture for the Smart GridIEEE Transactions on Industrial Informatics201836
16Analysis of requirements for critical control systemsInternational Journal of Critical Infrastructure Protection201235
17Policy enforcement system for secure interoperable control in distributed Smart Grid systemsJournal of Network and Computer Applications201635
18Entity Name System: The Back-Bone of an Open and Scalable Web of Data200834
19Unleashing public-key cryptography in wireless sensor networksJournal of Computer Security200632
20WASAM: A dynamic wide-area situational awareness model for critical domains in Smart GridsFuture Generation Computer Systems201430
21Analysis of location privacy solutions in wireless sensor networksIET Communications201129
22Blockchain-assisted access for federated Smart Grid domains: Coupling and featuresJournal of Parallel and Distributed Computing202029
23Security Aspects of SCADA and DCS EnvironmentsLecture Notes in Computer Science201227
24Smart control of operational threats in control substationsComputers and Security201327
25Certified electronic mail: Properties revisitedComputers and Security201025
26Managing Incidents in Smart Grids à la Cloud201124
27An Early Warning System Based on Reputation for Energy Control SystemsIEEE Transactions on Smart Grid201124
28Covert Channels-Based Stealth Attacks in Industry 4.0IEEE Systems Journal201924
29Applying the semantic Web layers to access control023
30Immune System for the Internet of Things Using Edge TechnologiesIEEE Internet of Things Journal201923
31Analysis of Secure Mobile Grid Systems: A systematic approachInformation and Software Technology201021
32Exploiting Context-Awareness to Enhance Source-Location Privacy in Wireless Sensor NetworksComputer Journal201121
33Distributed Identity Management Model for Digital Ecosystems200720
34Secure SCADA framework for the protection of energy control systemsConcurrency Computation Practice and Experience201120
35A framework for secure execution of softwareInternational Journal of Information Security200419
36Specification and design of advanced authentication and authorization servicesComputer Standards and Interfaces200519
37Fair Traceable Multi-Group SignaturesLecture Notes in Computer Science200819
38Resilient interconnection in cyber-physical control systemsComputers and Security201719
39Anonymity 2.0 – X.509 Extensions Supporting Privacy-Friendly Authentication200718
40Analysis and taxonomy of security/QoS tradeoff solutions for the future internetSecurity and Communication Networks201416
41Integration of a Threat Traceability Solution in the Industrial Internet of ThingsIEEE Transactions on Industrial Informatics202016
42Towards a Business Process-Driven Framework for Security Engineering with the UMLLecture Notes in Computer Science200315
43A metadata‐based access control model for web servicesInternet Research200515
44A peer-to-peer multidimensional trust model for digital ecosystems200815
45A methodology for security assurance-driven system developmentRequirements Engineering201115
46Applicability of Public Key Infrastructures in Wireless Sensor NetworksLecture Notes in Computer Science200715
47Specification of a framework for the anonymous use of privilegesTelematics and Informatics200614
48Using Peer Review for Student Performance Enhancement: Experiences in a Multidisciplinary Higher Education SettingEducation Sciences202114
49A business process-driven approach to security engineering013
50Optimized multi‐party certified email protocolsInformation Management and Computer Security200513