| Year | Rank | Type | Title / Venue / Authors |
|---|---|---|---|
| 2026 | J | jnl |
CoRR
|
| 2025 | A* | conf |
MobiCom
|
| 2025 | A | conf |
DSN
|
| 2025 | J | jnl |
CoRR
|
| 2025 | J | jnl |
CoRR
|
| 2025 | J | jnl |
IEEE Trans. Dependable Secur. Comput.
|
| 2025 | B | conf |
NOMS
|
| 2025 | J | jnl |
Computer
|
| 2025 | J | jnl |
Computer
|
| 2025 | J | jnl |
IEEE Open J. Commun. Soc.
|
| 2025 | J | jnl |
IEEE Internet Things J.
|
| 2025 | J | jnl |
IEEE Trans. Inf. Forensics Secur.
|
| 2025 | B | conf |
Networking
|
| 2025 | J | jnl |
IEEE Commun. Surv. Tutorials
|
| 2025 | J | jnl |
IEEE Open J. Commun. Soc.
|
| 2025 | — | conf |
MeditCom
|
| 2025 | — | conf |
NFV-SDN
|
| 2025 | J | jnl |
CoRR
|
| 2025 | Misc | conf |
ICNC
|
| 2024 | A* | conf |
INFOCOM
|
| 2024 | J | jnl |
CoRR
|
| 2024 | Misc | conf |
ICNC
|
| 2024 | J | jnl |
J. Comput. Secur.
|
| 2024 | J | jnl |
Comput. Networks
|
| 2024 | — | conf |
ISSRE (Workshops)
|
| 2024 | — | conf |
iMETA
|
| 2024 | B | conf |
IFIP Networking
|
| 2024 | — | conf |
NFV-SDN
|
| 2024 | — | conf |
ISC (2)
|
| 2024 | J | jnl |
CoRR
|
| 2024 | — | conf |
MetaCom
|
| 2024 | — | conf |
SmartGridComm
|
| 2024 | B | conf |
IFIP Networking
|
| 2024 | — | conf |
CITS
|
| 2024 | J | jnl |
Sensors
|
| 2024 | J | jnl |
CoRR
|
| 2024 | C | conf |
IPCCC
|
| 2024 | — | conf |
iThings/GreenCom/CPSCom/SmartData/Cybermatics
|
| 2024 | B | conf |
ICCCN
|
| 2024 | J | jnl |
Sensors
|
| 2024 | B | conf |
GLOBECOM
|
| 2024 | A | conf |
DSN
|
| 2024 | A | conf |
ACSAC
|
| 2024 | J | jnl |
CoRR
|
| 2023 | J | jnl |
CoRR
|
| 2023 | B | conf |
GLOBECOM
|
| 2023 | A | conf |
IMC
|
| 2023 | — | conf |
SVCC
|
| 2023 | J | jnl |
IEEE J. Sel. Areas Commun.
|
| 2023 | J | jnl |
IEEE Trans. Veh. Technol.
|
| 2023 | J | jnl |
Computer
|
| 2023 | A* | conf |
INFOCOM
|
| 2023 | B | conf |
SMC
|
| 2023 | — | conf |
VTC2023-Spring
|
| 2023 | — | conf |
MetaCom
|
| 2023 | J | jnl |
IEEE Internet Things J.
|
| 2022 | B | conf |
WCNC
|
| 2022 | A* | conf |
CCS
|
| 2022 | — | conf |
LATINCOM
|
| 2022 | B | conf |
GLOBECOM
|
| 2022 | J | jnl |
CoRR
|
| 2022 | J | jnl |
CoRR
|
| 2022 | A* | ed. |
CCS
|
| 2022 | — | conf |
VTC Spring
|
| 2022 | — | conf |
LATINCOM
|
| 2022 | B | conf |
WCNC
|
| 2022 | J | jnl |
CoRR
|
| 2022 | Misc | conf |
SCN
|
| 2022 | J | jnl |
IEEE Trans. Cloud Comput.
|
| 2021 | — | conf |
IoTDI
|
| 2021 | J | jnl |
CoRR
|
| 2021 | J | jnl |
IEEE Secur. Priv.
|
| 2021 | A | conf |
DSN
|
| 2021 | A* | conf |
USENIX Security Symposium
|
| 2020 | J | jnl |
Computer
|
| 2020 | J | jnl |
Computer
|
| 2020 | J | jnl |
IEEE Internet Comput.
|
| 2020 | A* | conf |
USENIX Security Symposium
|
| 2020 | J | jnl |
CoRR
|
| 2020 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2020 | J | jnl |
IEEE Trans. Syst. Man Cybern. Syst.
|
| 2020 | — | conf |
EuroSec@EuroSys
|
| 2019 | J | jnl |
CoRR
|
| 2018 | — | conf |
MALWARE
|
| 2018 | J | jnl |
Computer
|
| 2018 | A | conf |
AsiaCCS
|
| 2018 | — | conf |
ESORICS (2)
|
| 2018 | A* | conf |
USENIX Security Symposium
|
| 2018 | — | conf |
DSC
|
| 2018 | J | jnl |
J. Syst. Softw.
|
| 2018 | — | ed. |
EuroSec@EuroSys
|
| 2018 | — | conf |
DSC
|
| 2018 | J | jnl |
IEEE Trans. Dependable Secur. Comput.
|
| 2017 | — | conf |
SE4Science@ICSE
|
| 2017 | J | jnl |
ACM Trans. Web
|
| 2017 | — | conf |
EUROSEC
|
| 2017 | A* | conf |
CCS
|
| 2017 | J | jnl |
CoRR
|
| 2017 | J | jnl |
Cybersecurity Leadership: Competencies, Governance, and Technologies for Industrial Control Systems.
J. Interconnect. Networks
|
| 2017 | J | jnl |
Computer
|
| 2017 | A | conf |
DSN
|
| 2017 | — | conf |
CODASPY
|
| 2017 | A | conf |
ICDCS
|
| 2017 | B | conf |
ARES
|
| 2017 | J | jnl |
CoRR
|
| 2017 | — | conf |
PerCom Workshops
|
| 2017 | A | conf |
RAID
|
| 2017 | — | conf |
Preliminary study of fission defenses against low-volume DoS attacks on proxied multiserver systems.
MALWARE
|
| 2017 | — | ed. |
EUROSEC
|
| 2017 | — | ed. |
CCSW
|
| 2017 | A | conf |
AsiaCCS
|
| 2017 | — | conf |
MILCOM
|
| 2017 | J | jnl |
Computer
|
| 2017 | — | conf |
PerCom Workshops
|
| 2016 | — | conf |
WAY@SOUPS
|
| 2016 | J | jnl |
IEEE Commun. Surv. Tutorials
|
| 2016 | J | jnl |
IEEE Secur. Priv.
|
| 2016 | J | jnl |
Computer
|
| 2016 | A* | conf |
When a Tree Falls: Using Diversity in Ensemble Classifiers to Identify Evasion in Malware Detectors.
NDSS
|
| 2016 | B | conf |
ACNS
|
| 2015 | — | conf |
eCrime
|
| 2015 | A | conf |
RAID
|
| 2015 | A* | conf |
WWW
|
| 2015 | B | conf |
ICNP
|
| 2015 | A | conf |
RAID
|
| 2015 | A | conf |
RAID
|
| 2015 | A | conf |
RAID
|
| 2015 | J | jnl |
Computer
|
| 2015 | — | conf |
MALWARE
|
| 2015 | A | conf |
AsiaCCS
|
| 2015 | A* | conf |
IEEE Symposium on Security and Privacy
|
| 2014 | — | conf |
ESORICS (1)
|
| 2014 | J | jnl |
Comput. Commun.
|
| 2014 | B | conf |
ACNS
|
| 2014 | A | conf |
DSN
|
| 2014 | — | conf |
ESORICS (2)
|
| 2014 | A | conf |
DSN
|
| 2014 | J | jnl |
IEEE Trans. Dependable Secur. Comput.
|
| 2014 | A | ed. |
RAID
|
| 2014 | C | conf |
ISC
|
| 2013 | — | conf |
SERE (Companion)
|
| 2013 | J | jnl |
Wirel. Pers. Commun.
|
| 2013 | — | conf |
SERE (Companion)
|
| 2013 | Misc | conf |
ICNC
|
| 2013 | J | jnl |
Soc. Netw. Anal. Min.
|
| 2013 | B | conf |
ICCCN
|
| 2013 | — | conf |
SERE
|
| 2013 | J | jnl |
ACM Trans. Internet Techn.
|
| 2013 | B | conf |
ARES
|
| 2013 | A | ed. |
RAID
|
| 2013 | A | conf |
DSN
|
| 2013 | — | conf |
CyCon
|
| 2012 | — | conf |
SERE (Companion)
|
| 2012 | A | conf |
DSN
|
| 2012 | — | conf |
AST@ICSE
|
| 2012 | — | conf |
SERE (Companion)
|
| 2012 | — | conf |
SERE (Companion)
|
| 2012 | J | jnl |
Computer
|
| 2012 | J | jnl |
IEEE Trans. Dependable Secur. Comput.
|
| 2012 | — | conf |
MMM-ACNS
|
| 2012 | — | conf |
HICSS
|
| 2012 | B | conf |
MDM
|
| 2012 | A | conf |
ACSAC
|
| 2012 | — | conf |
MMM-ACNS
|
| 2012 | — | conf |
SERE
|
| 2012 | B | conf |
DIMVA
|
| 2012 | A* | conf |
NDSS
|
| 2012 | — | conf |
STM
|
| 2012 | — | conf |
ICDCS Workshops
|
| 2011 | B | conf |
ICCCN
|
| 2011 | A | conf |
RAID
|
| 2011 | J | jnl |
CoRR
|
| 2011 | — | conf |
SADFE
|
| 2011 | — | conf |
Financial Cryptography Workshops
|
| 2011 | — | ch. |
Encyclopedia of Cryptography and Security (2nd Ed.)
|
| 2011 | B | conf |
ASONAM
|
| 2011 | — | conf |
CENTERIS (3)
|
| 2011 | — | ch. |
Encyclopedia of Cryptography and Security (2nd Ed.)
|
| 2011 | — | conf |
SysSec@DIMVA
|
| 2011 | J | jnl |
Commun. ACM
|
| 2011 | C | conf |
SecureComm
|
| 2010 | — | ed. |
CSET
|
| 2010 | — | conf |
HICSS
|
| 2010 | Misc | conf |
ICISC
|
| 2010 | A | conf |
ACSAC
|
| 2010 | — | conf |
HealthSec
|
| 2010 | A | conf |
RAID
|
| 2010 | J | jnl |
Mach. Learn.
|
| 2010 | A | conf |
ESORICS
|
| 2010 | — | conf |
POLICY
|
| 2010 | — | conf |
HotSec
|
| 2010 | — | conf |
MobiCASE
|
| 2010 | A | conf |
ESORICS
|
| 2009 | — | ed. |
2nd Workshop on Cyber Security Experimentation and Test, CSET '09, Montreal, Canada, August 10, 2009
CSET
|
| 2009 | C | conf |
ISC
|
| 2009 | A | conf |
RAID
|
| 2009 | C | conf |
ISC
|
| 2009 | C | conf |
SecureComm
|
| 2009 | — | conf |
AISec
|
| 2009 | — | conf |
Privacy in Location-Based Applications
|
| 2009 | — | ed. |
VMSec@CCS
|
| 2009 | Misc | conf |
SAC
|
| 2009 | — | conf |
CSET
|
| 2009 | J | jnl |
IEEE Commun. Mag.
|
| 2008 | — | conf |
PiLBA
|
| 2008 | A* | conf |
SP
|
| 2008 | — | conf |
VMSec
|
| 2008 | — | conf |
SITIS
|
| 2008 | A | conf |
Privacy Enhancing Technologies
|
| 2008 | — | ed. |
VMSec
|
| 2008 | B | conf |
ACNS
|
| 2008 | Misc | conf |
IWSEC
|
| 2008 | J | jnl |
IEEE Secur. Priv.
|
| 2008 | — | conf |
SITIS
|
| 2007 | B | conf |
DIMVA
|
| 2007 | — | conf |
COMSWARE
|
| 2007 | — | conf |
USENIX ATC
|
| 2007 | A* | conf |
CCS
|
| 2006 | C | conf |
NSPW
|
| 2006 | B | conf |
ACNS
|
| 2005 | A* | conf |
CCS
|
| 2005 | A* | conf |
NDSS
|
| 2005 | J | jnl |
Comput. Networks
|
| 2004 | B | conf |
ACNS
|
| 2004 | J | jnl |
IEEE J. Sel. Areas Commun.
|
| 2004 | J | jnl |
SIGMETRICS Perform. Evaluation Rev.
|
| 2003 | A* | conf |
CCS
|
| 2002 | B | conf |
ICNP
|
| 2002 | J | jnl |
Comput. Commun. Rev.
|