| Year | Rank | Type | Title / Venue / Authors |
|---|---|---|---|
| 2022 | J | jnl |
CoRR
|
| 2021 | J | jnl |
CoRR
|
| 2021 | Misc | conf |
SAC
|
| 2021 | — | conf |
ICANN (1)
|
| 2021 | — | conf |
ICANN (3)
|
| 2021 | C | conf |
ISC
|
| 2021 | J | jnl |
IEEE Trans. Software Eng.
|
| 2021 | J | jnl |
CoRR
|
| 2021 | A | conf |
RAID
|
| 2020 | — | conf |
CASE
|
| 2020 | Misc | conf |
SAC
|
| 2020 | A | conf |
ACSAC
|
| 2019 | J | jnl |
CoRR
|
| 2019 | A | conf |
ACSAC
|
| 2018 | — | conf |
EUSIPCO
|
| 2018 | J | jnl |
CoRR
|
| 2018 | B | conf |
ARES
|
| 2018 | — | conf |
ESORICS (1)
|
| 2018 | A | conf |
ACSAC
|
| 2018 | J | jnl |
CoRR
|
| 2018 | J | jnl |
CoRR
|
| 2018 | Misc | conf |
ICASSP
|
| 2018 | — | conf |
iThings/GreenCom/CPSCom/SmartData
|
| 2018 | A | conf |
RAID
|
| 2017 | Misc | conf |
SEC
|
| 2017 | — | ch. |
50 Jahre Universitäts-Informatik in München
|
| 2017 | J | jnl |
Inform. Spektrum
|
| 2017 | B | conf |
IJCNN
|
| 2017 | B | conf |
DIMVA
|
| 2017 | J | jnl |
Inform. Spektrum
|
| 2017 | — | ch. |
50 Jahre Universitäts-Informatik in München
|
| 2017 | — | ch. |
Handbuch Industrie 4.0 (4)
|
| 2017 | J | jnl |
CoRR
|
| 2016 | B | conf |
DIMVA
|
| 2016 | A | conf |
ACSAC
|
| 2016 | — | conf |
Australasian Conference on Artificial Intelligence
|
| 2016 | B | conf |
DIMVA
|
| 2016 | — | conf |
SmartGridComm
|
| 2016 | C | conf |
ISC
|
| 2016 | C | conf |
ISC
|
| 2015 | C | conf |
SECRYPT
|
| 2015 | — | conf |
QRS Companion
|
| 2015 | B | conf |
SAFECOMP
|
| 2015 | J | jnl |
Datenschutz und Datensicherheit
|
| 2015 | A | conf |
RAID
|
| 2015 | A | conf |
AsiaCCS
|
| 2015 | J | jnl |
J. Inf. Sci. Eng.
|
| 2015 | J | jnl |
Comput. Secur.
|
| 2015 | J | jnl |
Inform. Spektrum
|
| 2015 | J | jnl |
Datenschutz und Datensicherheit
|
| 2015 | Misc | conf |
Inscrypt
|
| 2015 | A* | conf |
ICML
|
| 2015 | B | conf |
DSAA
|
| 2015 | C | conf |
IDEAL
|
| 2015 | — | conf |
ISSA
|
| 2015 | J | jnl |
Neurocomputing
|
| 2015 | C | conf |
ISPEC
|
| 2015 | B | conf |
CANS
|
| 2014 | J | jnl |
J. Biomed. Informatics
|
| 2014 | — | conf |
SecureComm (2)
|
| 2014 | — | conf |
InnoSWDev@SIGSOFT FSE
|
| 2014 | A* | conf |
USENIX Security Symposium
|
| 2014 | C | conf |
ISC
|
| 2014 | — | conf |
DEXA Workshops
|
| 2014 | A* | conf |
NDSS
|
| 2014 | — | conf |
CODASPY
|
| 2014 | B | ed. |
TrustBus
|
| 2013 | — | conf |
INTRUST
|
| 2013 | A* | conf |
ICDM
|
| 2013 | — | conf |
Number Theory and Cryptography
|
| 2013 | Misc | conf |
SEC
|
| 2013 | — | conf |
ICMLA (1)
|
| 2013 | A* | conf |
AAAI
|
| 2013 | — | conf |
PAKDD (1)
|
| 2013 | B | conf |
NSS
|
| 2013 | C | conf |
ISC
|
| 2013 | J | jnl |
EAI Endorsed Trans. Mob. Commun. Appl.
|
| 2013 | A | conf |
ECIR
|
| 2013 | — | conf |
CyCAR@CCS
|
| 2013 | J | jnl |
it Inf. Technol.
|
| 2013 | B | conf |
NSS
|
| 2012 | — | conf |
ICGI
|
| 2012 | A | conf |
ECAI
|
| 2012 | — | conf |
MOBILWARE
|
| 2012 | J | jnl |
Datenschutz und Datensicherheit
|
| 2012 | — | conf |
PAKDD (1)
|
| 2012 | — | conf |
SocialCom/PASSAT
|
| 2012 | B | conf |
CBMS
|
| 2012 | B | conf |
SAFECOMP
|
| 2011 | Misc | conf |
ICISS
|
| 2011 | Misc | conf |
IWSEC
|
| 2011 | J | jnl |
Datenschutz und Datensicherheit
|
| 2011 | C | conf |
SecureComm
|
| 2010 | — | conf |
SECURWARE
|
| 2010 | — | conf |
ICGI
|
| 2010 | — | conf |
WESS
|
| 2010 | — | conf |
GI Jahrestagung (2)
|
| 2009 | — | conf |
VMSec@CCS
|
| 2009 | B | conf |
ARES
|
| 2009 | — | book |
IT-Sicherheit - Konzepte, Verfahren, Protokolle (6. Aufl.).
|
| 2008 | — | conf |
VTC Fall
|
| 2008 | J | jnl |
Comput. Stand. Interfaces
|
| 2008 | B | conf |
WiMob
|
| 2008 | — | conf |
WISEC
|
| 2008 | Misc | conf |
ICISC
|
| 2008 | — | conf |
SECURWARE
|
| 2008 | — | book |
IT-Sicherheit - Konzepte, Verfahren, Protokolle (5. Aufl.).
|
| 2008 | — | conf |
STC
|
| 2008 | — | conf |
WPES
|
| 2008 | J | jnl |
Inf. Secur. Tech. Rep.
|
| 2008 | B | conf |
ARES
|
| 2007 | — | conf |
WOSIS
|
| 2007 | C | conf |
ICICS
|
| 2007 | C | conf |
ATC
|
| 2007 | Misc | conf |
WISA
|
| 2007 | — | conf |
ESAS
|
| 2007 | J | jnl |
Datenschutz und Datensicherheit
|
| 2007 | — | conf |
POLICY
|
| 2007 | A | conf |
AsiaCCS
|
| 2007 | — | conf |
Description Logics
|
| 2007 | — | conf |
KES (3)
|
| 2007 | J | jnl |
Datenschutz und Datensicherheit
|
| 2007 | B | conf |
ARES
|
| 2007 | B | conf |
TrustBus
|
| 2007 | — | conf |
DEXA Workshops
|
| 2006 | J | jnl |
it Inf. Technol.
|
| 2006 | — | conf |
Intelligent Information Systems
|
| 2006 | — | book |
IT-Sicherheit - Konzepte, Verfahren, Protokolle (4. Aufl.).
|
| 2006 | — | conf |
ICARIS
|
| 2006 | — | conf |
ICARIS
|
| 2006 | B | conf |
IEEE Congress on Evolutionary Computation
|
| 2005 | — | conf |
ICARIS
|
| 2005 | — | conf |
Description Logics
|
| 2005 | A | conf |
GECCO
|
| 2005 | B | conf |
Congress on Evolutionary Computation
|
| 2005 | — | conf |
SPC
|
| 2005 | J | jnl |
Prax. Inf.verarb. Kommun.
|
| 2004 | — | conf |
GECCO (1)
|
| 2004 | — | book |
IT-Sicherheit - Konzepte, Verfahren, Protokolle (3. Aufl.).
|
| 2004 | — | conf |
DFN-Arbeitstagung über Kommunikationsnetze
|
| 2004 | J | jnl |
Inform. Spektrum
|
| 2004 | Misc | conf |
SAC
|
| 2004 | — | conf |
DFN-Arbeitstagung über Kommunikationsnetze
|
| 2003 | — | conf |
DFN-Arbeitstagung über Kommunikationsnetze
|
| 2003 | — | book |
IT-Sicherheit - Konzepte, Verfahren, Protokolle (2. Aufl.).
|
| 2003 | J | jnl |
Prax. Inf.verarb. Kommun.
|
| 2001 | Misc | conf |
SEC
|
| 2001 | J | jnl |
Informationstechnik Tech. Inform.
|
| 2000 | Misc | conf |
SEC
|
| 2000 | — | conf |
ACM SIGOPS European Workshop
|
| 1999 | J | jnl |
J. Supercomput.
|
| 1997 | — | conf |
HICSS (1)
|
| 1997 | Misc | conf |
SEC
|
| 1997 | Misc | conf |
PDPTA
|
| 1997 | Misc | conf |
SEC
|
| 1996 | Misc | conf |
SEC
|
| 1993 | — | — |
|
| 1990 | — | conf |
Security and Persistence
|