Computers and Security

Computers and Security

ISSNs: 0167-4048

Additional searchable ISSN (Electronic): 1872-6208

Elsevier Advanced Technology, United Kingdom

Scopus rating (2022): CiteScore 11.1 SJR 1.605 SNIP 2.232

Journal

Journal Metrics

Research Output

  1. 2022
  2. Published

    Keypad entry inference with sensor fusion from mobile and smart wearables

    Liu, Y., Qureshi, U. M. & Hancke, G. P., Oct 2022, In: Computers and Security. 121, 102837.

    Research output: Journal Publications and ReviewsRGC 21 - Publication in refereed journalpeer-review

    Check@CityULib
  3. SPrivAD: A secure and privacy-preserving mutually dependent authentication and data access scheme for smart communities

    Sani, A. S., Bertino, E., Yuan, D., Meng, K. & Dong, Z. Y., Apr 2022, In: Computers and Security. 115, 102610.

    Research output: Journal Publications and ReviewsRGC 21 - Publication in refereed journalpeer-review

    Scopus citations: 8
    Check@CityULib
  4. 2021
  5. Published

    Intrusion detection methods based on integrated deep learning model

    Wang, Z., Liu, Y., He, D. & Chan, S., Apr 2021, In: Computers & Security. 103, 102177.

    Research output: Journal Publications and ReviewsRGC 21 - Publication in refereed journalpeer-review

    Scopus citations: 63
    Check@CityULib
  6. 2018
  7. Published

    Tangible security: Survey of methods supporting secure ad-hoc connects of edge devices with physical context

    Hu, Q., Zhang, J., Mitrokotsa, A. & Hancke, G., Sept 2018, In: Computers and Security. 78, p. 281-300

    Research output: Journal Publications and ReviewsRGC 21 - Publication in refereed journalpeer-review

    Scopus citations: 16
    Check@CityULib
  8. Published

    JFCGuard: Detecting juice filming charging attack via processor usage analysis on smartphones

    Meng, W., Jiang, L., Wang, Y., Li, J., Zhang, J. & Xiang, Y., Jul 2018, In: Computers and Security. 76, p. 252-264

    Research output: Journal Publications and ReviewsRGC 21 - Publication in refereed journalpeer-review

    Scopus citations: 21
    Check@CityULib
  9. 2017
  10. Published

    Towards enhancing click-draw based graphical passwords using multi-touch behaviours on smartphones

    Meng, W., Li, W., Kwok, L. & Choo, K. R., 1 Mar 2017, In: Computers and Security. 65, p. 213-229

    Research output: Journal Publications and ReviewsRGC 21 - Publication in refereed journalpeer-review

    Scopus citations: 32
    Check@CityULib
  11. 2016
  12. Published

    MVPSys: Toward practical multi-view based false alarm reduction system in network intrusion detection

    Li, W., Meng, W., Luo, X. & Kwok, L. F., 1 Jul 2016, In: Computers and Security. 60, p. 177-192

    Research output: Journal Publications and ReviewsRGC 21 - Publication in refereed journalpeer-review

    Scopus citations: 27
    Check@CityULib
  13. 2014
  14. Published

    EFM: Enhancing the performance of signature-based network intrusion detection systems using enhanced filter mechanism

    Meng, W., Li, W. & Kwok, L., Jun 2014, In: Computers and Security. 43, p. 189-204

    Research output: Journal Publications and ReviewsRGC 21 - Publication in refereed journalpeer-review

    Scopus citations: 92
    Check@CityULib
  15. 2013
  16. Published

    Future directions for behavioral information security research

    Crossler, R. E., Johnston, A. C., Lowry, P. B., Hu, Q., Warkentin, M. & Baskerville, R., 2013, In: Computers and Security. 32, p. 90-101

    Research output: Journal Publications and ReviewsRGC 21 - Publication in refereed journalpeer-review

    Scopus citations: 532
    Check@CityULib
  17. 2009
  18. Confidence in smart token proximity: Relay attacks revisited

    Hancke, G. P., Mayes, K. E. & Markantonakis, K., Oct 2009, In: Computers and Security. 28, 7, p. 615-627

    Research output: Journal Publications and ReviewsRGC 21 - Publication in refereed journalpeer-review

    Scopus citations: 91
    Check@CityULib
  19. 2003
  20. Security middleware for enhancing interoperability of Public Key Infrastructure

    Lam, K., Chung, S., Gu, M. & Sun, J., Sept 2003, In: Computers & Security. 22, 6, p. 535-546

    Research output: Journal Publications and ReviewsRGC 21 - Publication in refereed journalpeer-review

    Scopus citations: 4
    Check@CityULib
  21. 1998
  22. Published

    Cryptanalysis of a timestamp-based password authentication scheme

    Chan, C. & Cheng, L. M., 1998, In: Computers and Security. 21, 1, p. 74-76

    Research output: Journal Publications and ReviewsRGC 21 - Publication in refereed journalpeer-review

    Scopus citations: 77
    Check@CityULib
  23. 1996
  24. Published

    A Security Officers’ Workbench

    Kwok, L. F. & Longley, D., 1996, In: Computers and Security. 15, 8, p. 695-705

    Research output: Journal Publications and ReviewsRGC 21 - Publication in refereed journalpeer-review

    Scopus citations: 7
    Check@CityULib