| Year | Rank | Type | Title / Venue / Authors |
|---|---|---|---|
| 2026 | J | jnl |
IEEE Trans. Reliab.
|
| 2026 | J | jnl |
IEEE Trans. Dependable Secur. Comput.
|
| 2026 | J | jnl |
IEEE Trans. Software Eng.
|
| 2025 | J | jnl |
CoRR
|
| 2025 | J | jnl |
IEEE Trans. Reliab.
|
| 2025 | J | jnl |
J. Intell. Inf. Syst.
|
| 2025 | J | jnl |
Int. J. Softw. Eng. Knowl. Eng.
|
| 2025 | J | jnl |
Future Gener. Comput. Syst.
|
| 2025 | J | jnl |
Comput. Secur.
|
| 2025 | J | jnl |
Int. J. Softw. Eng. Knowl. Eng.
|
| 2025 | J | jnl |
IEEE Trans. Software Eng.
|
| 2025 | J | jnl |
IEEE Trans. Software Eng.
|
| 2024 | J | jnl |
Future Internet
|
| 2024 | J | jnl |
J. Cloud Comput.
|
| 2024 | J | jnl |
Comput. Secur.
|
| 2024 | J | jnl |
Expert Syst. Appl.
|
| 2024 | A* | conf |
USENIX Security Symposium
|
| 2024 | J | jnl |
CoRR
|
| 2024 | J | jnl |
Appl. Soft Comput.
|
| 2024 | J | jnl |
CoRR
|
| 2024 | J | jnl |
Empir. Softw. Eng.
|
| 2024 | J | jnl |
Comput. Secur.
|
| 2024 | J | jnl |
Softw. Qual. J.
|
| 2023 | J | jnl |
Comput. Secur.
|
| 2023 | — | conf |
ICDF2C (2)
|
| 2023 | A* | conf |
ASE
|
| 2023 | J | jnl |
CoRR
|
| 2023 | J | jnl |
Comput. Secur.
|
| 2023 | — | conf |
SecureComm (1)
|
| 2023 | J | jnl |
Appl. Intell.
|
| 2023 | — | conf |
ICDF2C (1)
|
| 2023 | J | jnl |
Comput. Secur.
|
| 2023 | J | jnl |
Int. J. Intell. Syst.
|
| 2023 | — | conf |
KSEM (4)
|
| 2023 | J | jnl |
Knowl. Based Syst.
|
| 2023 | J | jnl |
Autom. Softw. Eng.
|
| 2022 | C | conf |
SecureComm
|
| 2022 | J | jnl |
J. Intell. Fuzzy Syst.
|
| 2022 | J | jnl |
GCNXSS: An Attack Detection Approach for Cross-Site Scripting Based on Graph Convolutional Networks.
KSII Trans. Internet Inf. Syst.
|
| 2022 | J | jnl |
Comput. Secur.
|
| 2022 | J | jnl |
Inf. Sci.
|
| 2022 | J | jnl |
Comput. Secur.
|
| 2022 | J | jnl |
Comput. Secur.
|
| 2022 | J | jnl |
Neurocomputing
|
| 2022 | J | jnl |
J. Intell. Fuzzy Syst.
|
| 2022 | J | jnl |
Appl. Intell.
|
| 2022 | J | jnl |
Comput. Secur.
|
| 2022 | A | conf |
RAID
|
| 2022 | — | conf |
Internetware
|
| 2021 | J | jnl |
EAI Endorsed Trans. Security Safety
|
| 2021 | J | jnl |
Comput. J.
|
| 2021 | — | conf |
ICICS (1)
|
| 2021 | J | jnl |
Inf.
|
| 2021 | B | conf |
TrustCom
|
| 2021 | J | jnl |
Neurocomputing
|
| 2021 | J | jnl |
Comput. Secur.
|
| 2021 | J | jnl |
Int. J. Distributed Sens. Networks
|
| 2021 | J | jnl |
J. Intell. Fuzzy Syst.
|
| 2021 | B | conf |
TrustCom
|
| 2021 | — | conf |
CSE
|
| 2021 | J | jnl |
J. Inf. Secur. Appl.
|
| 2021 | — | conf |
ICDF2C
|
| 2021 | J | jnl |
Secur. Commun. Networks
|
| 2021 | J | jnl |
Secur. Commun. Networks
|
| 2020 | J | jnl |
IEEE Access
|
| 2020 | J | jnl |
IEEE Access
|
| 2020 | J | jnl |
J. Comput. Virol. Hacking Tech.
|
| 2020 | J | jnl |
Secur. Commun. Networks
|
| 2020 | J | jnl |
Comput. Secur.
|
| 2020 | J | jnl |
Neural Comput. Appl.
|
| 2020 | — | conf |
DSC
|
| 2020 | J | jnl |
Secur. Commun. Networks
|
| 2020 | J | jnl |
Comput. Secur.
|
| 2020 | J | jnl |
Comput. J.
|
| 2020 | J | jnl |
IEEE Access
|
| 2020 | J | jnl |
Secur. Commun. Networks
|
| 2020 | J | jnl |
Bioinform.
|
| 2020 | J | jnl |
Digit. Investig.
|
| 2019 | — | conf |
ICICT (2)
|
| 2019 | J | jnl |
IEEE Access
|
| 2019 | J | jnl |
Secur. Commun. Networks
|
| 2019 | — | conf |
ICAIS (3)
|
| 2019 | J | jnl |
KSII Trans. Internet Inf. Syst.
|
| 2019 | J | jnl |
IEEE Access
|
| 2019 | J | jnl |
Future Internet
|
| 2019 | J | jnl |
Secur. Commun. Networks
|
| 2018 | — | conf |
ICCSP
|
| 2018 | — | conf |
ICCAI
|
| 2018 | — | conf |
ICCAI
|
| 2018 | J | jnl |
IEEE Access
|
| 2018 | — | conf |
ICCSP
|
| 2018 | — | conf |
DSC
|
| 2017 | A | conf |
AsiaCCS
|
| 2016 | J | jnl |
Comput. Secur.
|