Most Cited


Top 10 Cited (articles published in the last five years)
Extracted from Scopus (on Mar 28 )

14 Taylor, M. | Haggerty, J. | Gresty, D. | Lamb, D.
Forensic investigation of cloud computing systems
Network Security, Volume 2011, Issue 3, 2011-03-01, Pages 4-10
9 Heron, S.
Technologies for spam detection
Network Security, Volume 2009, Issue 1, 2009-01-01, Pages 11-15
8 Rexworthy, B.
Intrusion detections systems - an outmoded network protection model
Network Security, Volume 2009, Issue 6, 2009-06-01, Pages 17-19
8 Sloan, K.
Security in a virtualised world
Network Security, Volume 2009, Issue 8, 2009-08-01, Pages 15-18
8 Thomson, G.
BYOD: Enabling the chaos
Network Security, Volume 2012, Issue 2, 2012-02-01, Pages 5-8
7 Goode, A.
Managing mobile security: How are we doing?
Network Security, Volume 2010, Issue 2, 2010-02-01, Pages 12-15
6 Heron, S.
Advanced Encryption Standard (AES)
Network Security, Volume 2009, Issue 12, 2009-12-01, Pages 8-12
6 Gold, S.
The SCADA challenge: securing critical infrastructure
Network Security, Volume 2009, Issue 8, 2009-08-01, Pages 18-20
6 Tankard, C.
Advanced Persistent threats and how to monitor and deter them
Network Security, Volume 2011, Issue 8, 2011-08-01, Pages 16-19
6 Khan, S. | Loo, K.-K.
Real-time cross-layer design for a large-scale flood detection and attack trace-back mechanism in IEEE 802.11 wireless mesh networks
Network Security, Volume 2009, Issue 5, 2009-05-01, Pages 9-16