| Year | Rank | Type | Title / Venue / Authors |
|---|---|---|---|
| 2026 | — | conf |
SIGCSE (1)
|
| 2026 | J | jnl |
CoRR
|
| 2026 | J | jnl |
IEEE Trans. Inf. Forensics Secur.
|
| 2025 | A* | conf |
ICLR
|
| 2025 | J | jnl |
J. Cybersecur. Priv.
|
| 2025 | J | jnl |
IEEE Trans. Smart Grid
|
| 2025 | J | jnl |
CoRR
|
| 2025 | J | jnl |
CoRR
|
| 2025 | J | jnl |
Inf. Secur. J. A Glob. Perspect.
|
| 2025 | J | jnl |
CoRR
|
| 2025 | J | jnl |
IEEE Trans. Serv. Comput.
|
| 2025 | — | conf |
VR/AR
|
| 2025 | J | jnl |
CoRR
|
| 2025 | A | conf |
AsiaCCS
|
| 2025 | J | jnl |
Ad Hoc Networks
|
| 2025 | J | jnl |
CoRR
|
| 2025 | J | jnl |
CoRR
|
| 2024 | J | jnl |
CoRR
|
| 2024 | — | conf |
SIGCSE (1)
|
| 2024 | J | jnl |
CoRR
|
| 2024 | J | jnl |
CoRR
|
| 2024 | J | jnl |
CoRR
|
| 2024 | J | jnl |
CoRR
|
| 2024 | J | jnl |
IEEE Trans. Neural Networks Learn. Syst.
|
| 2024 | — | conf |
Resilient Automated Distributed Device Scheduling in Smart Grids under False Data Injection Attacks.
SmartGridComm
|
| 2024 | J | jnl |
CoRR
|
| 2024 | J | jnl |
CoRR
|
| 2024 | — | conf |
SePEnTra: A Secure and Privacy-Preserving Energy Trading Mechanism in the Transactive Energy Market.
ProvSec (2)
|
| 2024 | J | jnl |
CoRR
|
| 2024 | J | jnl |
Vis. Comput.
|
| 2024 | — | conf |
ACISP (3)
|
| 2024 | — | conf |
iConference (3)
|
| 2024 | — | conf |
SecTL@AsiaCCS
|
| 2023 | J | jnl |
Sensors
|
| 2023 | — | conf |
iConference (1)
|
| 2023 | J | jnl |
Comput. Networks
|
| 2023 | J | jnl |
IEEE Trans. Dependable Secur. Comput.
|
| 2023 | — | conf |
ISGT EUROPE
|
| 2023 | J | jnl |
CoRR
|
| 2023 | — | conf |
HICSS
|
| 2023 | — | conf |
TPS-ISA
|
| 2023 | J | jnl |
CoRR
|
| 2023 | J | jnl |
CoRR
|
| 2023 | J | jnl |
IEEE Access
|
| 2023 | C | conf |
ICICS
|
| 2023 | J | jnl |
CoRR
|
| 2022 | J | jnl |
IEEE Access
|
| 2022 | J | jnl |
CoRR
|
| 2022 | J | jnl |
IEEE Trans. Inf. Forensics Secur.
|
| 2022 | J | jnl |
IEEE Trans. Serv. Comput.
|
| 2022 | — | conf |
ACSW
|
| 2022 | — | conf |
HICSS
|
| 2022 | J | jnl |
IEEE Trans. Serv. Comput.
|
| 2022 | A | conf |
AsiaCCS
|
| 2022 | J | jnl |
CoRR
|
| 2022 | A | conf |
DSN
|
| 2022 | — | conf |
HICSS
|
| 2022 | B | conf |
IJCNN
|
| 2022 | C | conf |
COMPASS
|
| 2022 | J | jnl |
IEEE Trans. Parallel Distributed Syst.
|
| 2022 | — | conf |
ACSW
|
| 2022 | J | jnl |
CoRR
|
| 2022 | B | conf |
IJCNN
|
| 2021 | B | conf |
TrustCom
|
| 2021 | J | jnl |
CoRR
|
| 2021 | B | conf |
TrustCom
|
| 2021 | J | jnl |
CoRR
|
| 2021 | — | conf |
ISGT Asia
|
| 2021 | J | jnl |
CoRR
|
| 2021 | — | conf |
ICDH
|
| 2021 | J | jnl |
CoRR
|
| 2021 | — | conf |
CODASPY
|
| 2020 | J | jnl |
CoRR
|
| 2020 | B | conf |
TrustCom
|
| 2020 | J | jnl |
CoRR
|
| 2020 | J | jnl |
Commun. ACM
|
| 2020 | J | jnl |
CoRR
|
| 2020 | J | jnl |
CoRR
|
| 2020 | B | conf |
NOMS
|
| 2020 | B | conf |
IJCNN
|
| 2020 | J | jnl |
CoRR
|
| 2020 | — | conf |
ICANN (1)
|
| 2020 | — | conf |
WISE (2)
|
| 2020 | B | conf |
TrustCom
|
| 2020 | — | conf |
ISGT-Europe
|
| 2020 | — | conf |
CIC
|
| 2019 | — | conf |
TrustCom/BigDataSE
|
| 2019 | B | conf |
IM
|
| 2019 | — | conf |
TrustCom/BigDataSE
|
| 2019 | C | conf |
ICIS
|
| 2019 | — | conf |
CYSARM@CCS
|
| 2019 | — | conf |
ACSW
|
| 2019 | J | jnl |
CoRR
|
| 2019 | — | conf |
CIC
|
| 2019 | — | conf |
ISGT Europe
|
| 2019 | A | conf |
ICWS
|
| 2019 | — | conf |
ACSW
|
| 2019 | — | conf |
CIC
|
| 2017 | C | conf |
ICIS
|
| 2017 | — | conf |
GameSec
|
| 2017 | J | jnl |
Comput. Secur.
|
| 2016 | — | conf |
ACISP (1)
|
| 2016 | — | conf |
GI-Jahrestagung
|
| 2015 | J | jnl |
Comput. J.
|
| 2015 | B | conf |
IM
|
| 2015 | Misc | conf |
SEC
|
| 2014 | — | conf |
SysCon
|
| 2014 | C | conf |
Software Engineering
|
| 2014 | J | jnl |
Dagstuhl Reports
|
| 2014 | — | conf |
ICC
|
| 2014 | — | conf |
ISSA
|
| 2014 | — | conf |
SmartGridComm
|
| 2013 | C | conf |
Software Engineering (Workshops)
|
| 2013 | B | conf |
IM
|
| 2013 | B | conf |
ARES
|
| 2013 | B | conf |
WCNC
|
| 2013 | C | conf |
SECRYPT
|
| 2013 | B | conf |
IM
|
| 2013 | — | conf |
SADFE
|
| 2013 | — | conf |
ICS-CSR
|
| 2013 | C | conf |
Software Engineering
|
| 2012 | — | conf |
INTRUST
|
| 2012 | — | conf |
IFIP Int. Conf. Digital Forensics
|
| 2012 | — | conf |
NTMS
|
| 2012 | C | conf |
APCC
|
| 2012 | C | conf |
Software Engineering
|
| 2011 | — | conf |
ISSA
|
| 2011 | J | jnl |
Inf. Media Technol.
|
| 2011 | J | jnl |
J. Inf. Process.
|
| 2011 | — | conf |
SADFE
|
| 2011 | — | conf |
STM
|
| 2010 | — | conf |
IFIPTM
|
| 2010 | J | jnl |
IEEE Trans. Biomed. Eng.
|
| 2010 | — | conf |
HCC
|
| 2010 | — | conf |
SADFE
|
| 2010 | C | conf |
WISTP
|
| 2009 | Misc | conf |
SEC
|
| 2009 | — | conf |
CSE (2)
|
| 2009 | — | conf |
DEXA Workshops
|
| 2009 | — | ch. |
Security and Dependability for Ambient Intelligence
|
| 2008 | — | conf |
VODCA@FOSAD
|
| 2008 | — | conf |
ICYCS
|
| 2007 | Misc | conf |
SEC
|
| 2007 | — | conf |
DEXA Workshops
|
| 2007 | A | conf |
ESORICS
|
| 2005 | A | conf |
ESORICS
|
| 2005 | J | jnl |
Comput. Stand. Interfaces
|
| 2005 | J | jnl |
Int. J. Inf. Sec.
|
| 2005 | J | jnl |
Formal Aspects Comput.
|
| 2005 | A* | conf |
ASE
|
| 2003 | — | conf |
DEXA Workshops
|
| 2003 | C | conf |
ISC
|
| 2003 | — | conf |
GI Jahrestagung (Schwerpunkt "Sicherheit - Schutz und Zuverlässigkeit")
|
| 2002 | — | conf |
InfraSec
|
| 2002 | — | conf |
DEXA Workshops
|
| 2002 | — | conf |
FASec
|
| 1998 | Misc | conf |
ACISP
|
| 1998 | — | book |
Analyse kryptographischer Protokolle mittels Produktnetzen basierend auf Modellannahmen der BAN-Logik.
|
| 1991 | — | — |