Home
Research Trends
Papers list
Open Access Journals
All Journals
Search in Journals
Contact us
Computers & Security
Title
Publication Date
Language
Citations
Anomaly-based network intrusion detection: Techniques, systems and challenges
2009/02/01
English
570
Toward developing a systematic approach to generate benchmark datasets for intrusion detection
2012/05/01
English
483
Privacy attitudes and privacy behaviour: A review of current research on the privacy paradox phenomenon
2017/01/01
English
463
Understanding information systems security policy compliance: An integration of the theory of planned behavior and the protection motivation theory
2012/02/01
English
384
From information security to cyber security
2013/10/01
English
307
Secure attribute-based data sharing for resource-limited users in cloud computing
2018/01/01
English
306
Bubbles of Trust: A decentralized blockchain-based authentication system for IoT
2018/09/01
English
303
Future directions for behavioral information security research
2013/02/01
English
296
An empirical comparison of botnet detection methods
2014/09/01
English
278
An optimal cluster formation based energy efficient dynamic scheduling hybrid MAC protocol for heavy traffic load in wireless sensor networks
2018/08/01
English
263
A survey of network-based intrusion detection data sets
2019/09/01
English
254
A review of cyber security risk assessment methods for SCADA systems
2016/02/01
English
241
Computer viruses
1987/02/01
English
239
Analysis of end user security behaviors
2005/03/01
English
236
Radio frequency identification (RFID)
2006/02/01
English
221
Explaining the privacy paradox: A systematic review of literature investigating privacy attitude and behavior
2018/08/01
English
191
Cyber security in the age of COVID-19: A timeline and analysis of cyber-crime and cyber-attacks during the pandemic
2021/06/01
English
189
Feature deduction and ensemble design of intrusion detection systems
2005/06/01
English
183
A GA-LR wrapper approach for feature selection in network intrusion detection
2017/09/01
English
181
The cyber threat landscape: Challenges and future research directions
2011/11/01
English
180
Survey of machine learning techniques for malware analysis
2019/03/01
English
166
Cyber physical systems security: Analysis, challenges and solutions
2017/07/01
English
159
Image-Based malware classification using ensemble of CNN architectures (IMCEC)
2020/05/01
English
158
Towards information security behavioural compliance
2004/05/01
English
155
Self-efficacy in information security: Its influence on end users' information security practice behavior
2009/11/01
English
153
DL-Droid: Deep learning based android malware detection using real devices
2020/02/01
English
152
BEST: Blockchain-based secure energy trading in SDN-enabled intelligent transportation system
2019/08/01
English
151
Intelligent financial fraud detection: A comprehensive review
2016/03/01
English
149
Determining employee awareness using the Human Aspects of Information Security Questionnaire (HAIS-Q)
2014/05/01
English
147
Understanding online safety behaviors: A protection motivation theory perspective
2016/06/01
English
146
«
‹ Pervious
Next ›
»