| Year | Rank | Type | Title / Venue / Authors |
|---|---|---|---|
| 2026 | J | jnl |
CoRR
|
| 2025 | J | jnl |
CoRR
|
| 2025 | J | jnl |
CoRR
|
| 2025 | — | conf |
AISec@CCS
|
| 2025 | — | conf |
EICC
|
| 2025 | J | jnl |
Int. J. Inf. Sec.
|
| 2025 | J | jnl |
Digit. Threat. Res. Pract.
|
| 2024 | J | jnl |
J. Univers. Comput. Sci.
|
| 2024 | — | conf |
EICC
|
| 2024 | A | conf |
Assessing the Silent Frontlines: Exploring the Impact of DDoS Hacktivism in the Russo-Ukrainian War.
ACSAC
|
| 2024 | — | conf |
EICC
|
| 2024 | — | conf |
iThings/GreenCom/CPSCom/SmartData/Cybermatics
|
| 2024 | J | jnl |
CoRR
|
| 2023 | — | conf |
EuroS&P Workshops
|
| 2023 | C | conf |
ICISSP
|
| 2023 | J | jnl |
DTRAP
|
| 2023 | — | conf |
EICC
|
| 2023 | — | conf |
EICC
|
| 2023 | J | jnl |
DTRAP
|
| 2023 | — | ed. |
SocialSec
|
| 2023 | — | conf |
SocialSec
|
| 2023 | J | jnl |
CoRR
|
| 2023 | J | jnl |
DTRAP
|
| 2022 | — | conf |
DSC
|
| 2022 | — | conf |
Hunting High or Low: Evaluating the Effectiveness of High-Interaction and Low-Interaction Honeypots.
STAST
|
| 2021 | J | jnl |
Cyberpsychology Behav. Soc. Netw.
|
| 2021 | — | conf |
NordSec
|
| 2021 | J | jnl |
J. Inf. Secur. Appl.
|
| 2021 | J | jnl |
Comput. Secur.
|
| 2021 | — | conf |
eCrime
|
| 2020 | B | conf |
ARES
|
| 2020 | — | conf |
NordSec
|
| 2020 | — | conf |
AIChallengeIoT@SenSys
|
| 2020 | J | jnl |
CoRR
|
| 2020 | C | conf |
ICISSP
|
| 2020 | C | conf |
ISC
|
| 2019 | — | conf |
NordSec
|
| 2019 | — | conf |
TrustCom/BigDataSE
|
| 2019 | — | conf |
CyberICPS/SECPRE/SPOSE/ADIoT@ESORICS
|
| 2018 | B | conf |
EWSN
|
| 2017 | J | jnl |
IEEE Secur. Priv.
|
| 2017 | — | conf |
SIoT
|
| 2015 | J | jnl |
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.
|
| 2015 | — | conf |
MIST@CCS
|
| 2015 | J | jnl |
IEEE Secur. Priv.
|
| 2015 | J | jnl |
IEEE Secur. Priv.
|
| 2014 | A* | conf |
CCS
|
| 2014 | — | conf |
WPES
|
| 2013 | — | conf |
Financial Cryptography
|
| 2012 | — | conf |
CHI Extended Abstracts
|
| 2012 | — | conf |
APF
|
| 2011 | — | conf |
CASoN
|
| 2009 | — | ch. |
Methods, Models and Tools for Fault Tolerance
|
| 2008 | — | conf |
VTC Fall
|
| 2007 | — | conf |
COMPSAC (2)
|
| 2007 | C | conf |
ISORC
|
| 2006 | — | conf |
SELMAS (LNCS)
|
| 2006 | — | conf |
SELMAS
|
| 2004 | J | jnl |
Comput. Secur.
|
| 2004 | J | jnl |
IEEE Softw.
|