| Year | Rank | Type | Title / Venue / Authors |
|---|---|---|---|
| 2022 | J | jnl |
CoRR
|
| 2018 | J | jnl |
IT Prof.
|
| 2017 | J | jnl |
IEEE Secur. Priv.
|
| 2017 | J | jnl |
Int. J. Auton. Adapt. Commun. Syst.
|
| 2016 | — | conf |
ACISP (1)
|
| 2012 | J | jnl |
CoRR
|
| 2012 | — | conf |
CSS
|
| 2010 | J | jnl |
J. Digit. Forensics Secur. Law
|
| 2009 | — | conf |
Security and Management
|
| 2009 | — | conf |
Security and Management
|
| 2009 | — | conf |
Security and Management
|
| 2008 | — | conf |
Security and Management
|
| 2008 | — | conf |
Security and Management
|
| 2008 | — | conf |
Security and Management
|
| 2007 | — | conf |
Security and Management
|
| 2007 | — | conf |
Security and Management
|
| 2006 | — | conf |
Security and Management
|
| 2005 | — | conf |
Australian Computer, Network & Information Forensics Conference
|
| 2005 | — | ed. |
Australian Computer, Network & Information Forensics Conference
|
| 2005 | — | ed. |
AISM
|
| 2005 | — | conf |
AISM
|
| 2005 | — | conf |
Australian Computer, Network & Information Forensics Conference
|
| 2004 | — | conf |
Australian Computer, Network & Information Forensics Conference
|