Most-cited papers on Security and Evaluation
Ranked by citation count via OpenAlex. Citations update on a rolling basis; list regenerates every 24h.
- 760 cited
Evaluating the security of logic encryption algorithms
2015 · Subramanyan, Pramod, Ray, Sayak, Malik, Sharad
- 752 cited
Evaluating Critical Security Issues of the IoT World: Present and Future Challenges
2017 · IEEE Internet of Things Journal · Frustaci, Mario, Pace, Pasquale, Aloi, Gianluca et al.
- 596 cited
1992 · Law and Human Behavior · Rice, Marnie E., Harris, Grant T., Cormier, Catherine A.
- 593 cited
2021 · Sustainable Cities and Society · Moustafa, Nour
- 508 cited
Model-based evaluation: from dependability to security
2004 · IEEE Transactions on Dependable and Secure Computing · Nicol, David M., Sanders, William H., Trivedi, Kishor S.
- 423 cited
Security Evaluation of Pattern Classifiers under Attack
2013 · IEEE Transactions on Knowledge and Data Engineering · Biggio, Battista, Fumera, Giorgio, Roli, Fabio
- 410 cited
Cyber-Physical Security Testbeds: Architecture, Application, and Evaluation for Smart Grid
2013 · IEEE Transactions on Smart Grid · Hahn, Adam, Ashok, Aditya, Sridhar, Siddharth et al.
- 404 cited
Experimenting with quantitative evaluation tools for monitoring operational security
1999 · IEEE Transactions on Software Engineering · Ortalo, Rodolphe, Deswarte, Yves, Kaâniche, Mohamed
- 378 cited
SoK: Security Evaluation of Home-Based IoT Deployments
2019 · Alrawi, Omar, Lever, Chaz, Antonakakis, Manos et al.
- 357 cited
A model for evaluating IT security investments
2004 · Communications of the ACM · Cavusoglu, Huseyin, Mishra, Birendra K., Raghunathan, Srinivasan
- 346 cited
Required Disclosure and the Stock Market: An Evaluation of the Securities Exchange Act of 1934
1973 · American Economic Review · Benston, George J.
- 328 cited
2014 · Lecture notes in computer science · Sun, Siwei, Hu, Lei, Wang, Peng et al.
- 318 cited
2015 · Journal of Financial Economics · Eser, Fabian, Schwaab, Bernd
- 303 cited
Evaluating energy security in the Asia-Pacific region: A novel methodological approach
2010 · Energy Policy · Vivoda, Vlado
- 287 cited
2004 · Computer Networks · Fan, Jinliang, Xu, Jun, Ammar, Mostafa et al.
- 274 cited
Generalized Generation Distribution Factors for Power System Security Evaluations
1981 · IEEE Transactions on Power Apparatus and Systems · Ng, Wai Pang
- 254 cited
Evaluating energy security performance from 1990 to 2010 for eighteen countries
2011 · Energy · Sovacool, Benjamin K., Mukherjee, Ishani, Drupady, Ira Martina et al.
- 249 cited
2012 · Lecture notes in computer science · Katzenbeisser, Stefan, Koçabas, Ünal, Rožić, Vladimir et al.
- 232 cited
Evaluation of Speaker Verification Security and Detection of HMM-Based Synthetic Speech
2012 · IEEE Transactions on Audio Speech and Language Processing · León, Phillip L. De, Pucher, Michael, Yamagishi, Junichi et al.
- 228 cited
1983 · American Journal of Public Health · Wentworth, Deborah, Neaton, James D., Rasmussen, Wayne L.
- 225 cited
Evaluating energy security in the Asia pacific: Towards a more comprehensive approach
2010 · Energy Policy · Sovacool, Benjamin K.
- 218 cited
Social security health insurance for the informal sector in Nicaragua: a randomized evaluation
2010 · Health Economics · Thornton, Rebecca, Hatt, Laurel, Field, Erica M. et al.
- 214 cited
Evaluation and drive mechanism of tourism ecological security based on the DPSIR-DEA model
2019 · Tourism Management · Ruan, Wen-Qi, Li, Yong‐Quan, Zhang, Shu-Ning et al.
- 210 cited
2013 · Energy Policy · Jewell, Jessica, Cherp, Aleh, Riahi, Keywan
- 209 cited
2021 · IEEE Internet of Things Journal · Ferrag, Mohamed Amine, Shu, Lei
- 205 cited
Evaluation of CAN Bus Security Challenges
2020 · Sensors · Bozdal, Mehmet, Samie, Mohammad, Aslam, Sohaib et al.
- 203 cited
Security attribute evaluation method
2002 · Butler, Shawn A.
- 193 cited
2021 · The Science of The Total Environment · Cheng, Haoran, Zhu, Likai, Meng, Jijun
- 187 cited
Machine Learning Security: Threats, Countermeasures, and Evaluations
2020 · IEEE Access · Xue, Mingfu, Yuan, Chengxiang, Wu, Heyi et al.
- 186 cited
A security evaluation of AIS automated identification system
2014 · Balduzzi, Marco, Pasta, Alessandro, Wilhoit, Kyle