| Year | Rank | Type | Title / Venue / Authors |
|---|---|---|---|
| 2014 | J | jnl |
Netw. Secur.
|
| 2014 | J | jnl |
Netw. Secur.
|
| 2014 | J | jnl |
Netw. Secur.
|
| 2014 | J | jnl |
Netw. Secur.
|
| 2013 | J | jnl |
Netw. Secur.
|
| 2013 | J | jnl |
Netw. Secur.
|
| 2012 | J | jnl |
Netw. Secur.
|
| 2012 | J | jnl |
Netw. Secur.
|
| 2011 | J | jnl |
Netw. Secur.
|
| 2011 | J | jnl |
Netw. Secur.
|
| 2010 | J | jnl |
Netw. Secur.
|
| 2010 | J | jnl |
Netw. Secur.
|
| 2010 | J | jnl |
Netw. Secur.
|
| 2010 | J | jnl |
Netw. Secur.
|
| 2007 | J | jnl |
Comput. Secur.
|
| 2007 | J | jnl |
Comput. Secur.
|
| 2006 | J | jnl |
Digit. Investig.
|
| 2006 | J | jnl |
Digit. Investig.
|
| 2006 | J | jnl |
Comput. Secur.
|
| 2006 | J | jnl |
Comput. Secur.
|
| 2006 | J | jnl |
Comput. Secur.
|
| 2005 | J | jnl |
Digit. Investig.
|