| Year | Rank | Type | Title / Venue / Authors |
|---|---|---|---|
| 2025 | J | jnl |
CoRR
|
| 2025 | J | jnl |
CoRR
|
| 2025 | J | jnl |
CoRR
|
| 2024 | C | conf |
NSPW
|
| 2024 | J | jnl |
CoRR
|
| 2024 | J | jnl |
CoRR
|
| 2023 | J | jnl |
CoRR
|
| 2023 | J | jnl |
IEEE Secur. Priv.
|
| 2022 | J | jnl |
IEEE Secur. Priv.
|
| 2022 | J | jnl |
IEEE Secur. Priv.
|
| 2020 | — | conf |
GraMSec
|
| 2020 | J | jnl |
CoRR
|
| 2020 | J | jnl |
Commun. ACM
|
| 2019 | J | jnl |
Dagstuhl Reports
|
| 2017 | C | conf |
NSPW
|
| 2014 | — | conf |
3GSE
|
| 2014 | J | jnl |
Commun. ACM
|
| 2014 | — | conf |
3GSE
|
| 2013 | A* | conf |
CCS
|
| 2013 | A | conf |
SIGCSE
|
| 2008 | — | conf |
MODSEC@MoDELS
|
| 2005 | — | conf |
WEIS
|
| 2004 | — | ch. |
Economics of Information Security
|
| 2002 | — | conf |
LISA
|
| 2001 | — | conf |
Digital Rights Management Workshop
|
| 2000 | — | conf |
CFP
|
| 1999 | — | conf |
Smartcard
|
| 1996 | — | conf |
Network Threats
|