| Year | Rank | Type | Title / Venue / Authors |
|---|---|---|---|
| 2025 | J | jnl |
ACM Trans. Cyber Phys. Syst.
|
| 2024 | J | jnl |
Commun. ACM
|
| 2024 | J | jnl |
Computer
|
| 2024 | J | jnl |
CoRR
|
| 2023 | J | jnl |
CoRR
|
| 2023 | J | jnl |
CoRR
|
| 2023 | — | conf |
SciSec
|
| 2023 | J | jnl |
Commun. ACM
|
| 2023 | J | jnl |
CoRR
|
| 2023 | Misc | conf |
CISS
|
| 2023 | J | jnl |
CoRR
|
| 2023 | J | jnl |
CoRR
|
| 2023 | — | conf |
CyCon
|
| 2022 | — | conf |
MILCOM
|
| 2022 | J | jnl |
CoRR
|
| 2022 | J | jnl |
CoRR
|
| 2022 | J | jnl |
CoRR
|
| 2022 | J | jnl |
CoRR
|
| 2022 | — | conf |
MILCOM
|
| 2021 | J | jnl |
Computer
|
| 2021 | J | jnl |
Computer
|
| 2021 | J | jnl |
CoRR
|
| 2021 | J | jnl |
CoRR
|
| 2021 | J | jnl |
Computer
|
| 2021 | J | jnl |
CoRR
|
| 2020 | J | jnl |
Computer
|
| 2020 | J | jnl |
IEEE Secur. Priv.
|
| 2020 | — | ch. |
Adaptive Autonomous Secure Cyber Systems
|
| 2019 | J | jnl |
CoRR
|
| 2019 | J | jnl |
CoRR
|
| 2019 | J | jnl |
CoRR
|
| 2019 | — | conf |
MILCOM
|
| 2019 | J | jnl |
CoRR
|
| 2018 | J | jnl |
CoRR
|
| 2018 | — | conf |
AAAI Spring Symposia
|
| 2018 | J | jnl |
CoRR
|
| 2018 | J | jnl |
CoRR
|
| 2018 | J | jnl |
CoRR
|
| 2018 | J | jnl |
CoRR
|
| 2018 | J | jnl |
CoRR
|
| 2018 | J | jnl |
CoRR
|
| 2018 | J | jnl |
CoRR
|
| 2018 | J | jnl |
CoRR
|
| 2018 | J | jnl |
CoRR
|
| 2018 | — | conf |
ICMCIS
|
| 2017 | J | jnl |
CoRR
|
| 2017 | J | jnl |
IEEE Secur. Priv.
|
| 2017 | J | jnl |
CoRR
|
| 2017 | J | jnl |
IEEE Trans. Inf. Forensics Secur.
|
| 2017 | J | jnl |
CoRR
|
| 2017 | J | jnl |
Computer
|
| 2017 | J | jnl |
CoRR
|
| 2017 | J | jnl |
CoRR
|
| 2017 | J | jnl |
CoRR
|
| 2017 | J | jnl |
CoRR
|
| 2016 | J | jnl |
CoRR
|
| 2016 | J | jnl |
CoRR
|
| 2016 | J | jnl |
CoRR
|
| 2016 | J | jnl |
CoRR
|
| 2016 | J | jnl |
CoRR
|
| 2016 | J | jnl |
CoRR
|
| 2016 | J | jnl |
CoRR
|
| 2016 | J | jnl |
CoRR
|
| 2016 | J | jnl |
Computer
|
| 2016 | J | jnl |
CoRR
|
| 2016 | J | jnl |
Computer
|
| 2016 | J | jnl |
CoRR
|
| 2016 | J | jnl |
CoRR
|
| 2015 | J | jnl |
CoRR
|
| 2015 | J | jnl |
CoRR
|
| 2015 | J | jnl |
CoRR
|
| 2015 | J | jnl |
CoRR
|
| 2015 | J | jnl |
CoRR
|
| 2015 | J | jnl |
CoRR
|
| 2015 | J | jnl |
CoRR
|
| 2015 | J | jnl |
CoRR
|
| 2015 | J | jnl |
Computer
|
| 2014 | — | ch. |
Cyber Defense and Situational Awareness
|
| 2014 | — | book |
Cyber Defense and Situational Awareness
|
| 2014 | — | book |
Cybersecurity Systems for Human Cognition Augmentation
|
| 2014 | — | ch. |
Cyber Defense and Situational Awareness
|
| 2014 | — | ch. |
Cybersecurity Systems for Human Cognition Augmentation
|
| 2014 | — | ch. |
Cyber Defense and Situational Awareness
|
| 2014 | — | ch. |
Adaptive, Dynamic, and Resilient Systems
|
| 2014 | J | jnl |
Computer
|
| 2014 | — | conf |
MTD@CCS
|
| 2014 | — | ch. |
Network Science and Cybersecurity
|
| 2013 | J | jnl |
IEEE Secur. Priv.
|
| 2011 | J | jnl |
Inf. Fusion
|
| 2009 | C | conf |
FUSION
|
| 2005 | J | jnl |
Appl. Intell.
|
| 2003 | J | jnl |
IEEE Intell. Syst.
|
| 2002 | — | conf |
AAAI/IAAI
|
| 2002 | — | conf |
AAAI/IAAI
|
| 2001 | C | conf |
ACC
|
| 1999 | J | jnl |
AI Mag.
|
| 1998 | — | conf |
AAAI/IAAI
|
| 1997 | — | conf |
AAAI Workshop: Constraints & Agents
|
| 1989 | — | conf |
MIT-JSME Workshop
|