| Year | Rank | Type | Title / Venue / Authors |
|---|---|---|---|
| 2023 | J | jnl |
J. Comput. Virol. Hacking Tech.
|
| 2022 | — | conf |
DSC
|
| 2021 | J | jnl |
IEEE Access
|
| 2021 | Misc | conf |
SEC
|
| 2021 | J | jnl |
Sensors
|
| 2021 | J | jnl |
IEEE Access
|
| 2021 | J | jnl |
CoRR
|
| 2020 | J | jnl |
J. Inf. Telecommun.
|
| 2019 | J | jnl |
Sensors
|
| 2019 | J | jnl |
IEEE Commun. Mag.
|
| 2019 | J | jnl |
J. Supercomput.
|
| 2019 | J | jnl |
IEEE J. Biomed. Health Informatics
|
| 2019 | J | jnl |
IEEE Access
|
| 2019 | J | jnl |
ICT Express
|
| 2019 | J | jnl |
IEEE Trans. Ind. Informatics
|
| 2019 | J | jnl |
Symmetry
|
| 2018 | J | jnl |
Pattern Recognit.
|
| 2018 | J | jnl |
J. Supercomput.
|
| 2018 | J | jnl |
J. Supercomput.
|
| 2018 | — | conf |
ISMICT
|
| 2018 | J | jnl |
IEEE Access
|
| 2018 | J | jnl |
IEEE Access
|
| 2017 | — | conf |
LCN Workshops
|
| 2017 | — | conf |
ICISSP (Revised Selected Papers)
|
| 2017 | — | conf |
MONAMI
|
| 2017 | — | conf |
ISCIT
|
| 2017 | J | jnl |
Digit. Investig.
|
| 2017 | — | conf |
iThings/GreenCom/CPSCom/SmartData
|
| 2017 | J | jnl |
IEEE Trans. Inf. Forensics Secur.
|
| 2017 | C | conf |
ICISSP
|
| 2016 | J | jnl |
IEEE Trans. Inf. Forensics Secur.
|
| 2016 | — | conf |
HICSS
|
| 2012 | — | conf |
CSS
|
| 2012 | J | jnl |
CoRR
|
| 2010 | J | jnl |
J. Digit. Forensics Secur. Law
|
| 2010 | — | conf |
Security and Management
|
| 2010 | — | conf |
Security and Management
|
| 2010 | B | conf |
NSS
|
| 2010 | J | jnl |
J. Digit. Forensics Secur. Law
|
| 2010 | — | ed. |
Security and Management
|
| 2010 | J | jnl |
J. Digit. Forensics Secur. Law
|
| 2009 | J | jnl |
J. Digit. Forensics Secur. Law
|
| 2009 | — | conf |
Security and Management
|
| 2009 | — | conf |
Security and Management
|
| 2009 | J | jnl |
J. Digit. Forensics Secur. Law
|
| 2008 | — | conf |
Security and Management
|
| 2008 | J | jnl |
J. Digit. Forensics Secur. Law
|
| 2008 | J | jnl |
J. Digit. Forensics Secur. Law
|
| 2007 | J | jnl |
Int. J. Inf. Comput. Secur.
|
| 2007 | — | conf |
Security and Management
|
| 2006 | J | jnl |
J. Digit. Forensics Secur. Law
|
| 2006 | — | conf |
Security and Management
|
| 2006 | J | jnl |
J. Digit. Forensics Secur. Law
|
| 2006 | — | conf |
Security and Management
|
| 2005 | — | conf |
Australian Computer, Network & Information Forensics Conference
|
| 2005 | — | conf |
Australian Computer, Network & Information Forensics Conference
|
| 2005 | — | conf |
Australian Computer, Network & Information Forensics Conference
|
| 2005 | — | conf |
Australian Computer, Network & Information Forensics Conference
|
| 2005 | — | conf |
Australian Computer, Network & Information Forensics Conference
|
| 2005 | — | conf |
ECIW
|
| 2005 | — | ed. |
Australian Computer, Network & Information Forensics Conference
|
| 2005 | — | ed. |
AISM
|
| 2004 | — | conf |
Security and Management
|
| 2004 | J | jnl |
Internet Res.
|
| 2004 | — | conf |
Australian Computer, Network & Information Forensics Conference
|
| 2004 | — | conf |
Australian Computer, Network & Information Forensics Conference
|
| 2003 | — | ed. |
Australian Computer, Network & Information Forensics Conference
|
| 2003 | — | conf |
Australian Computer, Network & Information Forensics Conference
|