| Year | Rank | Type | Title / Venue / Authors |
|---|---|---|---|
| 2023 | J | jnl |
Int. J. Inf. Sec.
|
| 2022 | J | jnl |
IEEE Internet Things J.
|
| 2021 | J | jnl |
IEEE Internet Things J.
|
| 2021 | J | jnl |
IEEE Access
|
| 2020 | B | conf |
NOMS
|
| 2020 | J | jnl |
Inf. Sci.
|
| 2020 | J | jnl |
Appl. Soft Comput.
|
| 2019 | J | jnl |
IEEE Internet Things J.
|
| 2018 | J | jnl |
IEEE Trans. Comput. Soc. Syst.
|
| 2018 | — | ch. |
Guide to Vulnerability Analysis for Computer Networks and Systems
|
| 2018 | — | conf |
HPCC/SmartCity/DSS
|
| 2018 | J | jnl |
Comput. Electr. Eng.
|
| 2018 | — | conf |
HPCC/SmartCity/DSS
|
| 2018 | — | conf |
ICC
|
| 2017 | B | conf |
From Personal Experience to Global Reputation for Trust Evaluation in the Social Internet of Things.
GLOBECOM
|
| 2017 | J | jnl |
Softw. Pract. Exp.
|
| 2017 | J | jnl |
IEEE Internet Things J.
|
| 2017 | — | conf |
iThings/GreenCom/CPSCom/SmartData
|
| 2017 | C | conf |
DeSE
|
| 2016 | — | conf |
Trustcom/BigDataSE/ISPA
|
| 2016 | C | conf |
DeSE
|
| 2016 | C | conf |
DeSE
|
| 2015 | — | conf |
CIT/IUCC/DASC/PICom
|
| 2015 | — | conf |
CIT/IUCC/DASC/PICom
|
| 2015 | J | jnl |
J. Decis. Syst.
|
| 2015 | — | conf |
CIT/IUCC/DASC/PICom
|
| 2015 | — | conf |
CIT/IUCC/DASC/PICom
|
| 2014 | — | ch. |
Cyberpatterns
|
| 2014 | — | ch. |
Cyberpatterns
|
| 2014 | — | ch. |
Secure and Trustworthy Service Composition
|
| 2013 | — | conf |
SocialCom
|
| 2013 | — | conf |
SocialCom
|
| 2013 | — | conf |
CCNC
|
| 2012 | — | conf |
CyberSecurity
|
| 2010 | — | ch. |
Handbook of Research on Computational Forensics, Digital Crime, and Investigation
|
| 2010 | — | conf |
SoSE
|
| 2008 | J | jnl |
Comput. Commun.
|
| 2007 | — | — |
|
| 2007 | — | conf |
ICC
|
| 2006 | — | conf |
CCNC
|
| 2006 | — | conf |
COMPSAC (2)
|
| 2006 | — | conf |
ICCSA (4)
|