Computers & Security

Title Publication Date Language Citations
Anomaly-based network intrusion detection: Techniques, systems and challenges2009/02/01English570
Toward developing a systematic approach to generate benchmark datasets for intrusion detection2012/05/01English483
Privacy attitudes and privacy behaviour: A review of current research on the privacy paradox phenomenon2017/01/01English463
Understanding information systems security policy compliance: An integration of the theory of planned behavior and the protection motivation theory2012/02/01English384
From information security to cyber security2013/10/01English307
Secure attribute-based data sharing for resource-limited users in cloud computing2018/01/01English306
Bubbles of Trust: A decentralized blockchain-based authentication system for IoT2018/09/01English303
Future directions for behavioral information security research2013/02/01English296
An empirical comparison of botnet detection methods2014/09/01English278
An optimal cluster formation based energy efficient dynamic scheduling hybrid MAC protocol for heavy traffic load in wireless sensor networks2018/08/01English263
A survey of network-based intrusion detection data sets2019/09/01English254
A review of cyber security risk assessment methods for SCADA systems2016/02/01English241
Computer viruses1987/02/01English239
Analysis of end user security behaviors2005/03/01English236
Radio frequency identification (RFID)2006/02/01English221
Explaining the privacy paradox: A systematic review of literature investigating privacy attitude and behavior2018/08/01English191
Cyber security in the age of COVID-19: A timeline and analysis of cyber-crime and cyber-attacks during the pandemic2021/06/01English189
Feature deduction and ensemble design of intrusion detection systems2005/06/01English183
A GA-LR wrapper approach for feature selection in network intrusion detection2017/09/01English181
The cyber threat landscape: Challenges and future research directions2011/11/01English180
Survey of machine learning techniques for malware analysis2019/03/01English166
Cyber physical systems security: Analysis, challenges and solutions2017/07/01English159
Image-Based malware classification using ensemble of CNN architectures (IMCEC)2020/05/01English158
Towards information security behavioural compliance2004/05/01English155
Self-efficacy in information security: Its influence on end users' information security practice behavior2009/11/01English153
DL-Droid: Deep learning based android malware detection using real devices2020/02/01English152
BEST: Blockchain-based secure energy trading in SDN-enabled intelligent transportation system2019/08/01English151
Intelligent financial fraud detection: A comprehensive review2016/03/01English149
Determining employee awareness using the Human Aspects of Information Security Questionnaire (HAIS-Q)2014/05/01English147
Understanding online safety behaviors: A protection motivation theory perspective2016/06/01English146