| Year | Rank | Type | Title / Venue / Authors |
|---|---|---|---|
| 2023 | — | ed. |
Cyber Science
|
| 2023 | J | jnl |
DTRAP
|
| 2022 | J | jnl |
Comput. Secur.
|
| 2022 | J | jnl |
Insider-threat detection: Lessons from deploying the CITD tool in three multinational organisations.
J. Inf. Secur. Appl.
|
| 2021 | B | conf |
ARES
|
| 2021 | J | jnl |
Comput. Secur.
|
| 2021 | B | conf |
ARES
|
| 2020 | J | jnl |
CoRR
|
| 2020 | — | conf |
CyberSA
|
| 2020 | J | jnl |
CoRR
|
| 2019 | — | conf |
CyberSA
|
| 2018 | — | conf |
GraMSec
|
| 2018 | B | conf |
ARES
|
| 2017 | — | conf |
HCI (22)
|
| 2017 | J | jnl |
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.
|
| 2017 | — | conf |
CyberSA
|
| 2016 | — | conf |
MIST@CCS
|
| 2016 | J | jnl |
Secur. Informatics
|
| 2016 | J | jnl |
Hum. centric Comput. Inf. Sci.
|
| 2016 | Misc | conf |
SAC
|
| 2016 | — | conf |
IEEE Symposium on Security and Privacy Workshops
|
| 2015 | J | jnl |
J. Internet Serv. Inf. Secur.
|
| 2015 | — | conf |
SIoT
|
| 2014 | — | conf |
ICAART (1)
|
| 2013 | — | — |
|
| 2013 | — | conf |
DPM/SETOP
|
| 2013 | J | jnl |
Inf. Sci.
|
| 2012 | J | jnl |
Inf. Process. Manag.
|
| 2011 | J | jnl |
J. Syst. Softw.
|
| 2010 | C | conf |
Privacy in Statistical Databases
|