| Year | Rank | Type | Title / Venue / Authors |
|---|---|---|---|
| 2021 | J | jnl |
Entropy
|
| 2019 | J | jnl |
J. Intell. Manuf.
|
| 2017 | J | jnl |
CoRR
|
| 2017 | J | jnl |
Protecting from Cloud-based SIP flooding attacks by leveraging temporal and structural fingerprints.
Comput. Secur.
|
| 2016 | B | conf |
IWCMC
|
| 2016 | — | conf |
CSE/EUC/DCABES
|
| 2016 | — | conf |
CSE/EUC/DCABES
|
| 2014 | — | conf |
NTMS
|
| 2013 | — | conf |
ICCIT
|
| 2012 | — | conf |
CyberC
|
| 2012 | — | conf |
ICT
|
| 2012 | J | jnl |
Ad Hoc Sens. Wirel. Networks
|
| 2012 | — | conf |
NGMAST
|
| 2011 | B | conf |
WCNC
|
| 2010 | C | conf |
WOWMOM
|