| Year | Rank | Type | Title / Venue / Authors |
|---|---|---|---|
| 2025 | J | jnl |
CoRR
|
| 2025 | J | jnl |
Comput. Commun.
|
| 2025 | J | jnl |
IEEE Access
|
| 2024 | J | jnl |
CoRR
|
| 2024 | J | jnl |
IEEE Access
|
| 2024 | C | conf |
DATA
|
| 2023 | — | conf |
SAFER-TEA
|
| 2023 | — | conf |
ICEIS (1)
|
| 2023 | — | conf |
BCCA
|
| 2023 | J | jnl |
IEEE Access
|
| 2023 | A* | conf |
NDSS
|
| 2023 | — | conf |
SAFER-TEA
|
| 2023 | — | conf |
SAFER-TEA
|
| 2023 | B | conf |
WiMob
|
| 2023 | J | jnl |
IEEE Access
|
| 2022 | J | jnl |
Int. J. Bus. Inf. Syst.
|
| 2022 | J | jnl |
Comput. Secur.
|
| 2020 | C | conf |
WoWMoM
|
| 2020 | — | conf |
ICSPIS
|
| 2020 | J | jnl |
Turkish J. Electr. Eng. Comput. Sci.
|
| 2020 | — | conf |
ICSPIS
|
| 2020 | — | conf |
ICSPIS
|
| 2020 | B | conf |
AINA
|
| 2019 | — | conf |
NTMS
|
| 2019 | C | conf |
CRiSIS
|
| 2019 | C | conf |
CRiSIS
|
| 2018 | — | conf |
GLOBECOM Workshops
|
| 2018 | — | ch. |
Computer and Network Security Essentials
|
| 2018 | B | conf |
IWCMC
|
| 2017 | A* | conf |
NDSS
|
| 2016 | — | conf |
Behavioral Service Graphs: A Big Data Approach for Prompt Investigation of Internet-Wide Infections.
NTMS
|
| 2016 | J | jnl |
IEEE Commun. Surv. Tutorials
|
| 2016 | J | jnl |
CoRR
|
| 2015 | J | jnl |
Comput. Commun.
|
| 2015 | J | jnl |
Wirel. Commun. Mob. Comput.
|
| 2014 | — | conf |
NTMS
|
| 2014 | — | conf |
ICC
|
| 2013 | J | jnl |
IEEE Commun. Mag.
|
| 2013 | J | jnl |
CoRR
|
| 2013 | B | conf |
NCA
|
| 2012 | C | conf |
CRiSIS
|