513(top 1%)
papers
11.8K(top 1%)
citations
49(top 2%)
h-index
87(top 2%)
g-index
644
all documents
13.2K
doc citations
2.6K
citing journals

Top Articles

#TitleJournalYearCitations
1A survey of modern authorship attribution methodsJournal of the Association for Information Science and Technology2009907
2Transforming the communication between citizens and government through AI-guided chatbotsGovernment Information Quarterly2019408
3Electricity demand loads modeling using AutoRegressive Moving Average (ARMA) modelsEnergy2008292
4A Survey on Machine-Learning Techniques for UAV-Based CommunicationsSensors2019289
5Tackling Faults in the Industry 4.0 Era—A Survey of Machine-Learning Solutions and Key AspectsSensors2020279
6Teleparallel equivalent of Gauss-Bonnet gravity and its modificationsPhysical Review D2014253
7Support Vectors Machine-based identification of heart valve diseases using heart soundsComputer Methods and Programs in Biomedicine2009223
8Swarm intelligence in intrusion detection: A surveyComputers and Security2011187
9An intelligent system for automated breast cancer diagnosis and prognosis using SVM based classifiersApplied Intelligence2007167
10Dynamical behavior in f ( T, T G ) cosmologyClassical and Quantum Gravity2014159
11Selfish unsplittable flowsTheoretical Computer Science2005148
12Cyber Threats to Industrial IoT: A Survey on Attacks and CountermeasuresIoT2021140
13F(T,TG)gravity">Cosmological applications ofF(T,TG)gravityPhysical Review D2014128
14Policy making 2.0: From theory to practiceGovernment Information Quarterly2013116
15Security requirements for e-government services: a methodological approach for developing a common PKI-based security policyComputer Communications2003110
16Author identification: Using text sampling to handle the class imbalance problemInformation Processing and Management2008107
17Space Efficient Hash Tables with Worst Case Constant Access TimeTheory of Computing Systems2004101
18Information systems security policies: a contextual perspectiveComputers and Security2005100
19Promoting open innovation in the public sector through social media monitoringGovernment Information Quarterly201795
20A Comprehensive Survey on Machine Learning Techniques for Android Malware DetectionInformation (Switzerland)202194
21DNS amplification attack revisitedComputers and Security201393
22Plagiarism detection using stopword n-gramsJournal of the Association for Information Science and Technology201191
23The Impact of 6G-IoT Technologies on the Development of Agriculture 5.0: A ReviewElectronics (Switzerland)202387
24Introducing touchstroke: keystroke‐based authentication system for smartphonesSecurity and Communication Networks201686
25An Integrated Computer Supported Acquisition, Handling, and Characterization System for Pigmented Skin Lesions in Dermatological ImagesIEEE Transactions on Information Technology in Biomedicine200580
26An interleukin-6 ZnO/SiO2/Si surface acoustic wave biosensorBiosensors and Bioelectronics200880
27A critical review of 13 years of mobile game-based learningEducational Technology Research and Development201780
28Properties of high sensitivity ZnO surface acoustic wave sensors on SiO2/(100) Si substratesSolid-State Electronics200879
29Application of Deep Reinforcement Learning in Traffic Signal Control: An Overview and Impact of Open Traffic DataApplied Sciences (Switzerland)202079
30Passive crowdsourcing in government using social mediaTransforming Government: People, Process and Policy201478
31Risk analysis of a patient monitoring system using Bayesian Network modelingJournal of Biomedical Informatics200677
32Face detection and recognition of natural human emotion using Markov random fieldsPersonal and Ubiquitous Computing200775
33Energy efficient network coding-based MAC for cooperative ARQ wireless networksAd Hoc Networks201373
34Relay selection for secure 5G green communicationsTelecommunication Systems201469
35A security architecture for interconnecting health information systemsInternational Journal of Medical Informatics200468
36A critical review of 7 years of Mobile Device ForensicsDigital Investigation201368
37Digitally Assisted Mindfulness in Training Self-Regulation Skills for Sustainable Mental Health: A Systematic ReviewBehavioral Sciences (Basel, Switzerland)202364
38The structure and complexity of Nash equilibria for a selfish routing gameTheoretical Computer Science200963
39The effects of product involvement and impulse buying on purchase intentions in mobile text advertisingElectronic Commerce Research and Applications201463
40A prototype cognitive radio architecture for TVWS exploitation under the real time secondary spectrum market policyPhysical Communication201462
41On the Competitive Ratio for Online Facility LocationAlgorithmica200760
42A resource intensive traffic-aware scheme using energy-aware routing in cognitive radio networksFuture Generation Computer Systems201460
43Radial Basis Function Neural Networks Classification for the Recognition of Idiopathic Pulmonary Fibrosis in Microscopic ImagesIEEE Transactions on Information Technology in Biomedicine200859
44A framework for protecting a SIP-based infrastructure against malformed message attacksComputer Networks200758
45The effect of soft ICT capital on innovation performance of Greek firmsJournal of Enterprise Information Management201358
46EmerLoc: Location-based services for emergency medical incidentsInternational Journal of Medical Informatics200755
47Utilizing bloom filters for detecting flooding attacks against SIP based servicesComputers and Security200955
48Secure UAV-Aided Mobile Edge Computing for IoT: A ReviewIEEE Access202255
49New facets of mobile botnet: architecture and evaluationInternational Journal of Information Security201554
50Performance evaluation of machine learning methods for path loss prediction in rural environment at 3.7 GHzWireless Networks202154