This webpage has moved to mlsec.org/topnotch
This webpage is an attempt to assemble a ranking of top-cited papers from the area of computer security. The ranking is automatically created based on citations of papers published at top security conferences. In particular, the ranking is based on the four tier-1 conferences (see the System Security Circus)
and the following tier-2 conferences
The citations for each paper are determined by crawling the DBLP service and Google Scholar. As both services limit crawling activity, the update interval for the ranking is large, such that citation counts change on average every two months.
Update: The crawling mechanism for DBLP has been updated on July 1, 2022. As a result, the paper database may show a few inconsistencies. This effect will disappear over the next months.
→ Check out the top-100 ranking
Absolute citations are not necessarily a good indicator for the impact of a paper, as the number of citations usually grows with the age of a paper. The following list shows an alternative ranking, where the citations are normalized by the age of each paper.
→ Check out the normalized top-100 ranking
If you are interested in a more detailed breakdown of top-cited
papers over time, you can find can find rankings for the last
decades here:
As with any ranking, the presented results do not necessarily reflect the true impact of a paper. Citations are only one metric to assess the reception of a paper and are insufficient to characterize all aspects contributing to the relevance of scientific work. Moreover, the underlying data may contain errors or missing information. Errare humanum est.
If you have questions, comments, complains, or ideas how to improve this webpage, feel free to send an email to Konrad Rieck. Alternatively, you can contact me on Twitter.