| Year | Rank | Type | Title / Venue / Authors |
|---|---|---|---|
| 2025 | C | conf |
PDP
|
| 2025 | Misc | conf |
COMSNETS
|
| 2025 | C | conf |
PDP
|
| 2024 | Misc | conf |
COMSNETS
|
| 2024 | J | jnl |
CoRR
|
| 2024 | J | jnl |
Big Data Cogn. Comput.
|
| 2024 | Misc | conf |
COMSNETS
|
| 2023 | J | jnl |
Sensors
|
| 2023 | Misc | conf |
IDC
|
| 2023 | J | jnl |
Soc. Netw. Anal. Min.
|
| 2023 | J | jnl |
Inf.
|
| 2023 | J | jnl |
Int. J. Inf. Sec.
|
| 2023 | Misc | conf |
FRUCT
|
| 2022 | C | conf |
PDP
|
| 2022 | J | jnl |
Sensors
|
| 2022 | J | jnl |
Sensors
|
| 2022 | Misc | conf |
IDC
|
| 2022 | J | jnl |
Sensors
|
| 2021 | Misc | conf |
IDC
|
| 2021 | Misc | conf |
IDC
|
| 2021 | J | jnl |
Inf.
|
| 2021 | Misc | conf |
FRUCT
|
| 2021 | J | jnl |
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.
|
| 2021 | C | conf |
PDP
|
| 2021 | — | conf |
MobiSec
|
| 2021 | J | jnl |
Sensors
|
| 2021 | J | jnl |
Microprocess. Microsystems
|
| 2020 | C | conf |
PDP
|
| 2020 | J | jnl |
Simul. Model. Pract. Theory
|
| 2020 | J | jnl |
Sensors
|
| 2020 | C | conf |
PDP
|
| 2020 | C | conf |
SIN
|
| 2019 | C | conf |
PDP
|
| 2019 | — | conf |
MobiSec
|
| 2019 | — | conf |
MobiSec
|
| 2019 | — | conf |
NTMS
|
| 2019 | J | jnl |
J. Internet Serv. Inf. Secur.
|
| 2019 | Misc | conf |
IDC
|
| 2019 | Misc | conf |
IDC
|
| 2019 | J | jnl |
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.
|
| 2019 | J | jnl |
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.
|
| 2019 | Misc | conf |
IDC
|
| 2019 | J | jnl |
CoRR
|
| 2018 | — | conf |
ICPS
|
| 2018 | J | jnl |
A visual analytics approach for the cyber forensics based on different views of the network traffic.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.
|
| 2018 | — | ch. |
Guide to Vulnerability Analysis for Computer Networks and Systems
|
| 2018 | J | jnl |
Inf. Technol. Control.
|
| 2018 | — | conf |
IOTAIS
|
| 2018 | — | conf |
CyberICPS/SECPRE@ESORICS
|
| 2018 | — | conf |
SocInfo (2)
|
| 2018 | — | conf |
ICPS
|
| 2017 | Misc | conf |
Analytical attack modeling and security assessment based on the common vulnerability scoring system.
FRUCT
|
| 2017 | J | jnl |
Int. J. Internet Protoc. Technol.
|
| 2017 | — | conf |
MMM-ACNS
|
| 2017 | — | conf |
IDAACS
|
| 2017 | Misc | conf |
IDC
|
| 2017 | — | conf |
MobiSec
|
| 2016 | C | conf |
PDP
|
| 2016 | J | jnl |
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.
|
| 2016 | J | jnl |
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.
|
| 2016 | — | conf |
CD-ARES
|
| 2015 | J | jnl |
Autom. Control. Comput. Sci.
|
| 2015 | C | conf |
PDP
|
| 2015 | — | conf |
IDAACS
|
| 2015 | Misc | conf |
IDC
|
| 2015 | J | jnl |
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.
|
| 2015 | J | jnl |
J. Internet Serv. Inf. Secur.
|
| 2014 | A* | conf |
ICDM
|
| 2014 | J | jnl |
J. Cyber Secur. Mobil.
|
| 2014 | C | conf |
PDP
|
| 2013 | — | conf |
CyCon
|
| 2013 | — | conf |
IDAACS
|
| 2013 | J | jnl |
Future Internet
|
| 2013 | — | conf |
IF&GIS
|
| 2012 | C | conf |
PDP
|
| 2012 | — | conf |
MMM-ACNS
|
| 2012 | C | conf |
SECRYPT
|
| 2012 | — | conf |
GreenCom
|
| 2012 | — | conf |
MMM-ACNS
|
| 2011 | — | conf |
IF&GIS
|