| Year | Rank | Type | Title / Venue / Authors |
|---|---|---|---|
| 2025 | J | jnl |
Algorithms
|
| 2025 | J | jnl |
IEEE Access
|
| 2025 | J | jnl |
Comput. Secur.
|
| 2025 | J | jnl |
Int. J. Inf. Sec.
|
| 2024 | J | jnl |
Int. J. Crit. Infrastructure Prot.
|
| 2024 | B | conf |
ARES
|
| 2024 | J | jnl |
Future Internet
|
| 2023 | — | conf |
MILCOM
|
| 2023 | J | jnl |
CoRR
|
| 2022 | J | jnl |
Sensors
|
| 2022 | J | jnl |
CoRR
|
| 2022 | J | jnl |
J. Inf. Secur. Appl.
|
| 2022 | J | jnl |
IEEE Access
|
| 2022 | J | jnl |
Secur. Commun. Networks
|
| 2021 | — | conf |
IoTDI
|
| 2021 | J | jnl |
CoRR
|
| 2021 | J | jnl |
IEEE Access
|
| 2021 | J | jnl |
Industrial and Critical Infrastructure Security: Technical Analysis of Real-Life Security Incidents.
IEEE Access
|
| 2021 | J | jnl |
CoRR
|
| 2021 | J | jnl |
Computer
|
| 2020 | J | jnl |
Symmetry
|
| 2020 | — | conf |
EM Fingerprints: Towards Identifying Unauthorized Hardware Substitutions in the Supply Chain Jungle.
SP (Workshops)
|
| 2019 | J | jnl |
Wirel. Commun. Mob. Comput.
|
| 2018 | J | jnl |
Computer
|
| 2017 | J | jnl |
Future Internet
|
| 2017 | — | conf |
EUROSEC
|
| 2017 | J | jnl |
Computer
|
| 2017 | J | jnl |
Int. J. Inf. Sec.
|
| 2017 | — | conf |
MILCOM
|
| 2016 | J | jnl |
IEEE Commun. Surv. Tutorials
|
| 2016 | J | jnl |
IEEE Secur. Priv.
|
| 2016 | J | jnl |
Computer
|
| 2015 | C | conf |
SECRYPT
|
| 2015 | J | jnl |
Computer
|
| 2014 | — | — |
|
| 2014 | — | conf |
IEEE BigData
|
| 2013 | — | ch. |
Semantic Hyper/Multimedia Adaptation
|
| 2013 | J | jnl |
IEEE Commun. Surv. Tutorials
|
| 2011 | J | jnl |
Comput. Commun.
|
| 2011 | J | jnl |
Comput. Secur.
|
| 2010 | J | jnl |
Pers. Ubiquitous Comput.
|
| 2009 | — | conf |
ISWCS
|
| 2009 | — | conf |
ISA
|
| 2008 | — | conf |
SMAP
|
| 2008 | — | conf |
PETRA
|
| 2008 | J | jnl |
Secur. Commun. Networks
|
| 2008 | — | conf |
SMAP
|