Computers & Security
About
In The Last Decade
Computers & Security
3.9k papers receiving 74.5k citations
Fields of papers published in Computers & Security
This network shows the impact of papers published in Computers & Security. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers published in Computers & Security.
Countries where authors publish in Computers & Security
This map shows the geographic impact of research published in Computers & Security. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by papers published in Computers & Security with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites Computers & Security more than expected).
- Anomaly-based network intrusion detection: Techniques, systems and challenges (2008)
- Toward developing a systematic approach to generate benchmark datasets for intrusion detection (2012)
- Understanding information systems security policy compliance: An integration of the theory of planned behavior and the protection motivation theory (2011)
- From information security to cyber security (2013)
- Electromagnetic radiation from video display units: An eavesdropping risk? (1985)
- Phishing for user security awareness (2006)
- From policies to culture (2004)
- Information Security – The Fourth Wave (2006)
- Information security obedience: a definition (2005)
Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive bibliographic database. While OpenAlex provides broad and valuable coverage of the global research landscape, it—like all bibliographic datasets—has inherent limitations. These include incomplete records, variations in author disambiguation, differences in journal indexing, and delays in data updates. As a result, some metrics and network relationships displayed in Rankless may not fully capture the entirety of a scholar’s output or impact.