| Year | Rank | Type | Title / Venue / Authors |
|---|---|---|---|
| 2023 | J | jnl |
Inf.
|
| 2020 | J | jnl |
J. Cyber Secur. Mobil.
|
| 2020 | J | jnl |
J. Inf. Secur. Appl.
|
| 2020 | J | jnl |
J. Inf. Secur. Appl.
|
| 2019 | — | conf |
IDAACS
|
| 2019 | — | conf |
NTMS
|
| 2019 | J | jnl |
Autom. Control. Comput. Sci.
|
| 2019 | J | jnl |
J. Univers. Comput. Sci.
|
| 2019 | — | conf |
Network Protocols Determination Based on Raw Data Analysis for Security Assesment under Uncertainty.
IDAACS
|
| 2019 | B | conf |
ARES
|
| 2018 | — | ch. |
Guide to Vulnerability Analysis for Computer Networks and Systems
|
| 2018 | J | jnl |
Inf. Technol. Control.
|
| 2018 | B | conf |
ARES
|
| 2018 | C | conf |
PDP
|
| 2017 | — | conf |
IDAACS
|
| 2017 | Misc | conf |
IDC
|
| 2015 | C | conf |
PDP
|
| 2015 | J | jnl |
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.
|