| 1 | A survey of modern authorship attribution methods | Journal of the Association for Information Science and Technology | 2009 | 907 |
| 2 | Transforming the communication between citizens and government through AI-guided chatbots | Government Information Quarterly | 2019 | 408 |
| 3 | Electricity demand loads modeling using AutoRegressive Moving Average (ARMA) models | Energy | 2008 | 292 |
| 4 | A Survey on Machine-Learning Techniques for UAV-Based Communications | Sensors | 2019 | 289 |
| 5 | Tackling Faults in the Industry 4.0 Era—A Survey of Machine-Learning Solutions and Key Aspects | Sensors | 2020 | 279 |
| 6 | Teleparallel equivalent of Gauss-Bonnet gravity and its modifications | Physical Review D | 2014 | 253 |
| 7 | Support Vectors Machine-based identification of heart valve diseases using heart sounds | Computer Methods and Programs in Biomedicine | 2009 | 223 |
| 8 | Swarm intelligence in intrusion detection: A survey | Computers and Security | 2011 | 187 |
| 9 | An intelligent system for automated breast cancer diagnosis and prognosis using SVM based classifiers | Applied Intelligence | 2007 | 167 |
| 10 | Dynamical behavior in
f
(
T, T
G
) cosmology | Classical and Quantum Gravity | 2014 | 159 |
| 11 | Selfish unsplittable flows | Theoretical Computer Science | 2005 | 148 |
| 12 | Cyber Threats to Industrial IoT: A Survey on Attacks and Countermeasures | IoT | 2021 | 140 |
| 13 | F(T,TG)gravity">Cosmological applications ofF(T,TG)gravity | Physical Review D | 2014 | 128 |
| 14 | Policy making 2.0: From theory to practice | Government Information Quarterly | 2013 | 116 |
| 15 | Security requirements for e-government services: a methodological approach for developing a common PKI-based security policy | Computer Communications | 2003 | 110 |
| 16 | Author identification: Using text sampling to handle the class imbalance problem | Information Processing and Management | 2008 | 107 |
| 17 | Space Efficient Hash Tables with Worst Case Constant Access Time | Theory of Computing Systems | 2004 | 101 |
| 18 | Information systems security policies: a contextual perspective | Computers and Security | 2005 | 100 |
| 19 | Promoting open innovation in the public sector through social media monitoring | Government Information Quarterly | 2017 | 95 |
| 20 | A Comprehensive Survey on Machine Learning Techniques for Android Malware Detection | Information (Switzerland) | 2021 | 94 |
| 21 | DNS amplification attack revisited | Computers and Security | 2013 | 93 |
| 22 | Plagiarism detection using stopword n-grams | Journal of the Association for Information Science and Technology | 2011 | 91 |
| 23 | The Impact of 6G-IoT Technologies on the Development of Agriculture 5.0: A Review | Electronics (Switzerland) | 2023 | 87 |
| 24 | Introducing touchstroke: keystroke‐based authentication system for smartphones | Security and Communication Networks | 2016 | 86 |
| 25 | An Integrated Computer Supported Acquisition, Handling, and Characterization System for Pigmented Skin Lesions in Dermatological Images | IEEE Transactions on Information Technology in Biomedicine | 2005 | 80 |
| 26 | An interleukin-6 ZnO/SiO2/Si surface acoustic wave biosensor | Biosensors and Bioelectronics | 2008 | 80 |
| 27 | A critical review of 13 years of mobile game-based learning | Educational Technology Research and Development | 2017 | 80 |
| 28 | Properties of high sensitivity ZnO surface acoustic wave sensors on SiO2/(100) Si substrates | Solid-State Electronics | 2008 | 79 |
| 29 | Application of Deep Reinforcement Learning in Traffic Signal Control: An Overview and Impact of Open Traffic Data | Applied Sciences (Switzerland) | 2020 | 79 |
| 30 | Passive crowdsourcing in government using social media | Transforming Government: People, Process and Policy | 2014 | 78 |
| 31 | Risk analysis of a patient monitoring system using Bayesian Network modeling | Journal of Biomedical Informatics | 2006 | 77 |
| 32 | Face detection and recognition of natural human emotion using Markov random fields | Personal and Ubiquitous Computing | 2007 | 75 |
| 33 | Energy efficient network coding-based MAC for cooperative ARQ wireless networks | Ad Hoc Networks | 2013 | 73 |
| 34 | Relay selection for secure 5G green communications | Telecommunication Systems | 2014 | 69 |
| 35 | A security architecture for interconnecting health information systems | International Journal of Medical Informatics | 2004 | 68 |
| 36 | A critical review of 7 years of Mobile Device Forensics | Digital Investigation | 2013 | 68 |
| 37 | Digitally Assisted Mindfulness in Training Self-Regulation Skills for Sustainable Mental Health: A Systematic Review | Behavioral Sciences (Basel, Switzerland) | 2023 | 64 |
| 38 | The structure and complexity of Nash equilibria for a selfish routing game | Theoretical Computer Science | 2009 | 63 |
| 39 | The effects of product involvement and impulse buying on purchase intentions in mobile text advertising | Electronic Commerce Research and Applications | 2014 | 63 |
| 40 | A prototype cognitive radio architecture for TVWS exploitation under the real time secondary spectrum market policy | Physical Communication | 2014 | 62 |
| 41 | On the Competitive Ratio for Online Facility Location | Algorithmica | 2007 | 60 |
| 42 | A resource intensive traffic-aware scheme using energy-aware routing in cognitive radio networks | Future Generation Computer Systems | 2014 | 60 |
| 43 | Radial Basis Function Neural Networks Classification for the Recognition of Idiopathic Pulmonary Fibrosis in Microscopic Images | IEEE Transactions on Information Technology in Biomedicine | 2008 | 59 |
| 44 | A framework for protecting a SIP-based infrastructure against malformed message attacks | Computer Networks | 2007 | 58 |
| 45 | The effect of soft ICT capital on innovation performance of Greek firms | Journal of Enterprise Information Management | 2013 | 58 |
| 46 | EmerLoc: Location-based services for emergency medical incidents | International Journal of Medical Informatics | 2007 | 55 |
| 47 | Utilizing bloom filters for detecting flooding attacks against SIP based services | Computers and Security | 2009 | 55 |
| 48 | Secure UAV-Aided Mobile Edge Computing for IoT: A Review | IEEE Access | 2022 | 55 |
| 49 | New facets of mobile botnet: architecture and evaluation | International Journal of Information Security | 2015 | 54 |
| 50 | Performance evaluation of machine learning methods for path loss prediction in rural environment at 3.7 GHz | Wireless Networks | 2021 | 54 |