Most-cited papers on Security and Evaluation

Ranked by citation count via OpenAlex. Citations update on a rolling basis; list regenerates every 24h.

  1. Evaluating the security of logic encryption algorithms

    2015 · Subramanyan, Pramod, Ray, Sayak, Malik, Sharad

    760 cited
  2. Evaluating Critical Security Issues of the IoT World: Present and Future Challenges

    2017 · IEEE Internet of Things Journal · Frustaci, Mario, Pace, Pasquale, Aloi, Gianluca et al.

    752 cited
  3. An evaluation of a maximum security therapeutic community for psychopaths and other mentally disordered offenders.

    1992 · Law and Human Behavior · Rice, Marnie E., Harris, Grant T., Cormier, Catherine A.

    596 cited
  4. Model-based evaluation: from dependability to security

    2004 · IEEE Transactions on Dependable and Secure Computing · Nicol, David M., Sanders, William H., Trivedi, Kishor S.

    508 cited
  5. Security Evaluation of Pattern Classifiers under Attack

    2013 · IEEE Transactions on Knowledge and Data Engineering · Biggio, Battista, Fumera, Giorgio, Roli, Fabio

    423 cited
  6. Cyber-Physical Security Testbeds: Architecture, Application, and Evaluation for Smart Grid

    2013 · IEEE Transactions on Smart Grid · Hahn, Adam, Ashok, Aditya, Sridhar, Siddharth et al.

    410 cited
  7. Experimenting with quantitative evaluation tools for monitoring operational security

    1999 · IEEE Transactions on Software Engineering · Ortalo, Rodolphe, Deswarte, Yves, Kaâniche, Mohamed

    404 cited
  8. SoK: Security Evaluation of Home-Based IoT Deployments

    2019 · Alrawi, Omar, Lever, Chaz, Antonakakis, Manos et al.

    378 cited
  9. A model for evaluating IT security investments

    2004 · Communications of the ACM · Cavusoglu, Huseyin, Mishra, Birendra K., Raghunathan, Srinivasan

    357 cited
  10. Required Disclosure and the Stock Market: An Evaluation of the Securities Exchange Act of 1934

    1973 · American Economic Review · Benston, George J.

    346 cited
  11. 287 cited
  12. Generalized Generation Distribution Factors for Power System Security Evaluations

    1981 · IEEE Transactions on Power Apparatus and Systems · Ng, Wai Pang

    274 cited
  13. Evaluating energy security performance from 1990 to 2010 for eighteen countries

    2011 · Energy · Sovacool, Benjamin K., Mukherjee, Ishani, Drupady, Ira Martina et al.

    254 cited
  14. PUFs: Myth, Fact or Busted? A Security Evaluation of Physically Unclonable Functions (PUFs) Cast in Silicon

    2012 · Lecture notes in computer science · Katzenbeisser, Stefan, Koçabas, Ünal, Rožić, Vladimir et al.

    249 cited
  15. Evaluation of Speaker Verification Security and Detection of HMM-Based Synthetic Speech

    2012 · IEEE Transactions on Audio Speech and Language Processing · León, Phillip L. De, Pucher, Michael, Yamagishi, Junichi et al.

    232 cited
  16. An evaluation of the Social Security Administration master beneficiary record file and the National Death Index in the ascertainment of vital status.

    1983 · American Journal of Public Health · Wentworth, Deborah, Neaton, James D., Rasmussen, Wayne L.

    228 cited
  17. Social security health insurance for the informal sector in Nicaragua: a randomized evaluation

    2010 · Health Economics · Thornton, Rebecca, Hatt, Laurel, Field, Erica M. et al.

    218 cited
  18. Evaluation and drive mechanism of tourism ecological security based on the DPSIR-DEA model

    2019 · Tourism Management · Ruan, Wen-Qi, Li, Yong‐Quan, Zhang, Shu-Ning et al.

    214 cited
  19. 209 cited
  20. Evaluation of CAN Bus Security Challenges

    2020 · Sensors · Bozdal, Mehmet, Samie, Mohammad, Aslam, Sohaib et al.

    205 cited
  21. Security attribute evaluation method

    2002 · Butler, Shawn A.

    203 cited
  22. Fuzzy evaluation of the ecological security of land resources in mainland China based on the Pressure-State-Response framework

    2021 · The Science of The Total Environment · Cheng, Haoran, Zhu, Likai, Meng, Jijun

    193 cited
  23. Machine Learning Security: Threats, Countermeasures, and Evaluations

    2020 · IEEE Access · Xue, Mingfu, Yuan, Chengxiang, Wu, Heyi et al.

    187 cited
  24. A security evaluation of AIS automated identification system

    2014 · Balduzzi, Marco, Pasta, Alessandro, Wilhoit, Kyle

    186 cited

Command palette

Jump anywhere, run any action.