Concept
cybersecurity engineering
Parents
Children
5G NetworksAccess ControlAdversarial Machine LearningAnomaly DetectionBlockchain
1.3K
Publications
59.2K
Citations
3.5K
Authors
1.3K
Institutions
Top Venues in Cybersecurity Engineering
Explore the leading academic conferences, journals, and publication venues where cutting-edge research in Cybersecurity Engineering is being shared and discussed. The statistics shown in this table are calculated from publications relevant to this concept and reflect each venue's impact within this specific field of study, not their overall metrics.
| Publications | Citations | H-Index | |
|---|---|---|---|
30 | 1.8K | 21 | |
23 | 1.4K | 20 | |
29 | 2.8K | 19 | |
27 | 1.2K | 18 | |
24 | 826 | 17 | |
15 | 773 | 14 | |
17 | 1.1K | 14 | |
13 | 416 | 13 | |
13 | 626 | 12 | |
15 | 452 | 12 | |
12 | 363 | 11 | |
11 | 680 | 11 |
Page 1
Page 1