| Year | Rank | Type | Title / Venue / Authors |
|---|---|---|---|
| 2017 | J | jnl |
Ingénierie des Systèmes d Inf.
|
| 2016 | J | jnl |
IEEE Secur. Priv.
|
| 2015 | J | jnl |
IEEE Secur. Priv.
|
| 2015 | J | jnl |
IEEE Secur. Priv.
|
| 2012 | — | book |
|
| 2012 | — | book |
Security in Computing, 4th Edition.
|
| 2010 | J | jnl |
IEEE Secur. Priv.
|
| 2009 | J | jnl |
ACM SIGCSE Bull.
|
| 2009 | J | jnl |
IBM J. Res. Dev.
|
| 2008 | — | ch. |
Insider Attack and Cyber Security
|
| 2006 | J | jnl |
IEEE Secur. Priv.
|
| 1997 | J | jnl |
IEEE Softw.
|
| 1989 | J | jnl |
Comput. Secur.
|
| 1989 | — | book |
Security in computing.
|
| 1989 | — | conf |
S&P
|
| 1988 | J | jnl |
Comput. Secur.
|
| 1979 | — | conf |
ACM Southeast Regional Conference
|
| 1978 | J | jnl |
IEEE Trans. Software Eng.
|
| 1977 | — | conf |
SIGCSE-1
|
| 1976 | — | conf |
SIGCSE-SIGCUE
|
| 1973 | J | jnl |
IEEE Trans. Computers
|