| Year | Rank | Type | Title / Venue / Authors |
|---|---|---|---|
| 2022 | — | conf |
ICACT
|
| 2022 | B | conf |
KES
|
| 2021 | B | conf |
KES
|
| 2021 | — | conf |
ICACT
|
| 2020 | — | conf |
iConference
|
| 2020 | — | conf |
ICACT
|
| 2020 | — | conf |
ICACT
|
| 2020 | J | jnl |
Digit. Investig.
|
| 2020 | — | conf |
ICACT
|
| 2020 | — | conf |
ICACT
|
| 2020 | — | conf |
ICACT
|
| 2020 | J | jnl |
Intelligence-led response: turning theory into law enforcement practice in cyber security incidents.
Int. J. Electron. Bus.
|
| 2020 | B | conf |
KES
|
| 2020 | J | jnl |
J. Intell. Fuzzy Syst.
|
| 2020 | — | conf |
ICACT
|
| 2020 | — | conf |
ICACT
|
| 2019 | — | conf |
ICACT
|
| 2019 | — | conf |
ICACT
|
| 2019 | — | conf |
ICACT
|
| 2019 | B | conf |
KES
|
| 2019 | — | conf |
ICACT
|
| 2019 | B | conf |
KES
|
| 2019 | — | conf |
ICACT
|
| 2019 | B | conf |
KES
|
| 2019 | — | conf |
ICACT
|
| 2019 | B | conf |
KES
|
| 2018 | B | conf |
SMC
|
| 2018 | J | jnl |
Digit. Investig.
|
| 2018 | — | conf |
ICACT
|
| 2018 | J | jnl |
Digit. Investig.
|
| 2018 | — | conf |
ICACT
|
| 2018 | — | conf |
ICACT
|
| 2018 | — | conf |
ICACT
|
| 2018 | — | conf |
ICACT
|
| 2017 | — | conf |
PAISI
|
| 2017 | — | conf |
PAISI
|
| 2016 | J | jnl |
J. Supercomput.
|
| 2015 | — | conf |
ICCST
|
| 2015 | — | conf |
COMPSAC Workshops
|
| 2014 | C | conf |
IWDW
|
| 2014 | A | conf |
ICS
|
| 2014 | — | conf |
PAISI
|
| 2011 | B | conf |
ICPADS
|
| 2010 | J | jnl |
Comput. Law Secur. Rev.
|
| 2009 | J | jnl |
Comput. Law Secur. Rev.
|
| 2009 | J | jnl |
Comput. Stand. Interfaces
|
| 2008 | — | conf |
ISI Workshops
|
| 2008 | C | conf |
APSCC
|
| 2007 | J | jnl |
Comput. Stand. Interfaces
|
| 2006 | C | conf |
ISI
|