Computers and Security

Computers and Security

ISSNs: 0167-4048

Additional searchable ISSN (electronic): 1872-6208

Elsevier Advanced Technology, United Kingdom

Scopus rating (2023): CiteScore 12.4 SJR 1.566 SNIP 2.163

Journal

Journal Metrics

Research Output

  1. 2025
  2. Published

    A classifications framework for continuous biometric authentication (2018–2024)

    Boshoff, D. & Hancke, G. P., Mar 2025, In: Computers and Security. 150, 104285.

    Research output: Journal Publications and ReviewsRGC 21 - Publication in refereed journalpeer-review

    Check@CityULib
  3. 2022
  4. Published

    Keypad entry inference with sensor fusion from mobile and smart wearables

    Liu, Y., Qureshi, U. M. & Hancke, G. P., Oct 2022, In: Computers and Security. 121, 102837.

    Research output: Journal Publications and ReviewsRGC 21 - Publication in refereed journalpeer-review

    Scopus citations: 2
    Check@CityULib
  5. SPrivAD: A secure and privacy-preserving mutually dependent authentication and data access scheme for smart communities

    Sani, A. S., Bertino, E., Yuan, D., Meng, K. & Dong, Z. Y., Apr 2022, In: Computers and Security. 115, 102610.

    Research output: Journal Publications and ReviewsRGC 21 - Publication in refereed journalpeer-review

    Scopus citations: 10
    Check@CityULib
  6. 2021
  7. Published

    Intrusion detection methods based on integrated deep learning model

    Wang, Z., Liu, Y., He, D. & Chan, S., Apr 2021, In: Computers & Security. 103, 102177.

    Research output: Journal Publications and ReviewsRGC 21 - Publication in refereed journalpeer-review

    Scopus citations: 92
    Check@CityULib
  8. 2018
  9. Published

    Tangible security: Survey of methods supporting secure ad-hoc connects of edge devices with physical context

    Hu, Q., Zhang, J., Mitrokotsa, A. & Hancke, G., Sept 2018, In: Computers and Security. 78, p. 281-300

    Research output: Journal Publications and ReviewsRGC 21 - Publication in refereed journalpeer-review

    Scopus citations: 16
    Check@CityULib
  10. Published

    JFCGuard: Detecting juice filming charging attack via processor usage analysis on smartphones

    Meng, W., Jiang, L., Wang, Y., Li, J., Zhang, J. & Xiang, Y., Jul 2018, In: Computers and Security. 76, p. 252-264

    Research output: Journal Publications and ReviewsRGC 21 - Publication in refereed journalpeer-review

    Scopus citations: 26
    Check@CityULib
  11. 2017
  12. Published

    Towards enhancing click-draw based graphical passwords using multi-touch behaviours on smartphones

    Meng, W., Li, W., Kwok, L.-F. & Choo, K.-K. R., 1 Mar 2017, In: Computers and Security. 65, p. 213-229

    Research output: Journal Publications and ReviewsRGC 21 - Publication in refereed journalpeer-review

    Scopus citations: 35
    Check@CityULib
  13. 2016
  14. Published

    MVPSys: Toward practical multi-view based false alarm reduction system in network intrusion detection

    Li, W., Meng, W., Luo, X. & Kwok, L. F., 1 Jul 2016, In: Computers and Security. 60, p. 177-192

    Research output: Journal Publications and ReviewsRGC 21 - Publication in refereed journalpeer-review

    Scopus citations: 27
    Check@CityULib
  15. 2014
  16. Published

    EFM: Enhancing the performance of signature-based network intrusion detection systems using enhanced filter mechanism

    Meng, W., Li, W. & Kwok, L.-F., Jun 2014, In: Computers and Security. 43, p. 189-204

    Research output: Journal Publications and ReviewsRGC 21 - Publication in refereed journalpeer-review

    Scopus citations: 100
    Check@CityULib
  17. 2013
  18. Published

    Future directions for behavioral information security research

    Crossler, R. E., Johnston, A. C., Lowry, P. B., Hu, Q., Warkentin, M. & Baskerville, R., 2013, In: Computers and Security. 32, p. 90-101

    Research output: Journal Publications and ReviewsRGC 21 - Publication in refereed journalpeer-review

    Scopus citations: 569
    Check@CityULib
  19. 2009
  20. Confidence in smart token proximity: Relay attacks revisited

    Hancke, G. P., Mayes, K. E. & Markantonakis, K., Oct 2009, In: Computers and Security. 28, 7, p. 615-627

    Research output: Journal Publications and ReviewsRGC 21 - Publication in refereed journalpeer-review

    Scopus citations: 93
    Check@CityULib
  21. 2003
  22. Security middleware for enhancing interoperability of Public Key Infrastructure

    Lam, K.-Y., Chung, S.-L., Gu, M. & Sun, J.-G., Sept 2003, In: Computers & Security. 22, 6, p. 535-546

    Research output: Journal Publications and ReviewsRGC 21 - Publication in refereed journalpeer-review

    Scopus citations: 4
    Check@CityULib
  23. 1998
  24. Published

    Cryptanalysis of a timestamp-based password authentication scheme

    Chan, C.-K. & Cheng, L. M., 1998, In: Computers and Security. 21, 1, p. 74-76

    Research output: Journal Publications and ReviewsRGC 21 - Publication in refereed journalpeer-review

    Scopus citations: 77
    Check@CityULib
  25. 1996
  26. Published

    A Security Officers’ Workbench

    Kwok, L. F. & Longley, D., 1996, In: Computers and Security. 15, 8, p. 695-705

    Research output: Journal Publications and ReviewsRGC 21 - Publication in refereed journalpeer-review

    Scopus citations: 7
    Check@CityULib