| Year | Rank | Type | Title / Venue / Authors |
|---|---|---|---|
| 2014 | J | jnl |
IEEE Secur. Priv.
|
| 2014 | J | jnl |
IEEE Secur. Priv.
|
| 2010 | J | jnl |
IEEE Secur. Priv.
|
| 2009 | — | ed. |
Critical Infrastructure Protection
|
| 2008 | J | jnl |
IEEE Secur. Priv.
|
| 2007 | J | jnl |
IEEE Secur. Priv.
|
| 2005 | J | jnl |
IEEE Secur. Priv.
|
| 2004 | J | jnl |
IEEE Secur. Priv.
|
| 2003 | J | jnl |
IBM Syst. J.
|
| 2001 | J | jnl |
IBM Syst. J.
|
| 1995 | J | jnl |
Networks
|
| 1994 | — | conf |
International Conference on Evolutionary Computation
|