| Year | Rank | Type | Title / Venue / Authors |
|---|---|---|---|
| 2025 | J | jnl |
Autom. Softw. Eng.
|
| 2025 | — | conf |
SIGSOFT FSE Companion
|
| 2025 | J | jnl |
Empir. Softw. Eng.
|
| 2025 | J | jnl |
CoRR
|
| 2025 | B | conf |
EuroGP
|
| 2025 | J | jnl |
CoRR
|
| 2024 | — | conf |
GI@ICSE
|
| 2024 | B | conf |
EuroGP
|
| 2024 | J | jnl |
CoRR
|
| 2024 | A* | conf |
ASE
|
| 2024 | J | jnl |
CoRR
|
| 2023 | — | conf |
Q-SE@ICSE
|
| 2023 | J | jnl |
CoRR
|
| 2023 | B | conf |
EuroGP
|
| 2023 | — | conf |
GECCO Companion
|
| 2023 | J | jnl |
CoRR
|
| 2023 | A | conf |
ISSTA
|
| 2023 | J | jnl |
IEEE Trans. Software Eng.
|
| 2023 | J | jnl |
IEEE Trans. Dependable Secur. Comput.
|
| 2022 | J | jnl |
Inf. Softw. Technol.
|
| 2022 | J | jnl |
IEEE Trans. Software Eng.
|
| 2022 | A* | conf |
Keeping Secrets: Multi-objective Genetic Improvement for Detecting and Reducing Information Leakage.
ASE
|
| 2022 | A | conf |
GECCO
|
| 2022 | J | jnl |
IEEE Trans. Software Eng.
|
| 2022 | J | jnl |
CoRR
|
| 2022 | C | ed. |
ICTSS
|
| 2021 | J | jnl |
IEEE Trans. Software Eng.
|
| 2021 | — | conf |
GECCO Companion
|
| 2021 | J | jnl |
ACM Trans. Softw. Eng. Methodol.
|
| 2021 | J | jnl |
Entropy
|
| 2021 | A* | conf |
ASE
|
| 2021 | J | jnl |
CoRR
|
| 2021 | — | conf |
ESEC/SIGSOFT FSE
|
| 2020 | J | jnl |
CoRR
|
| 2020 | J | jnl |
CoRR
|
| 2020 | — | conf |
ANTS Conference
|
| 2020 | — | conf |
From Lambda Calculus to Cybersecurity Through Program Analysis
|
| 2020 | J | jnl |
Entropy
|
| 2019 | B | conf |
SSBSE
|
| 2019 | A | conf |
ICST
|
| 2019 | B | conf |
SSBSE
|
| 2019 | J | jnl |
Inf. Process. Lett.
|
| 2019 | J | jnl |
CoRR
|
| 2019 | J | jnl |
Expert Syst. Appl.
|
| 2018 | J | jnl |
Empir. Softw. Eng.
|
| 2018 | J | jnl |
CoRR
|
| 2018 | A | conf |
ISSTA
|
| 2018 | J | jnl |
Expert Syst. Appl.
|
| 2016 | J | jnl |
CoRR
|
| 2016 | C | conf |
SCAM
|
| 2016 | A | conf |
ICST
|
| 2016 | A | conf |
ISSTA
|
| 2015 | J | jnl |
Math. Struct. Comput. Sci.
|
| 2015 | J | jnl |
CoRR
|
| 2015 | — | conf |
ICSE (2)
|
| 2015 | J | jnl |
CoRR
|
| 2014 | A* | conf |
ICSE
|
| 2013 | J | jnl |
IEEE Trans. Software Eng.
|
| 2013 | J | jnl |
ACM Trans. Softw. Eng. Methodol.
|
| 2013 | J | jnl |
ACM Comput. Surv.
|
| 2012 | J | jnl |
Inf. Process. Lett.
|
| 2011 | — | conf |
QEST
|
| 2011 | J | jnl |
Math. Struct. Comput. Sci.
|
| 2011 | A* | conf |
ICSE
|
| 2010 | — | conf |
IFIP TCS
|
| 2010 | J | jnl |
Inf. Process. Lett.
|
| 2009 | — | conf |
QAPL
|
| 2009 | — | ch. |
UML 2 Semantics and Applications
|
| 2009 | B | conf |
FASE
|
| 2009 | B | conf |
ARES
|
| 2008 | — | conf |
QSIC
|
| 2008 | — | conf |
Formal Aspects in Security and Trust
|
| 2008 | — | conf |
ICEIS (3-1)
|
| 2007 | J | jnl |
J. Comput. Secur.
|
| 2007 | J | jnl |
J. Object Technol.
|
| 2007 | J | jnl |
J. Log. Algebraic Methods Program.
|
| 2005 | J | jnl |
J. Log. Comput.
|
| 2005 | — | conf |
REFINE
|
| 2004 | — | conf |
QAPL
|
| 2004 | B | conf |
IFM
|
| 2003 | J | jnl |
Obj. Logiciel Base données Réseaux
|
| 2002 | B | conf |
IFM
|
| 2002 | J | jnl |
Comput. Lang. Syst. Struct.
|
| 2002 | B | conf |
SAFECOMP
|
| 2001 | — | conf |
QAPL
|
| 2000 | — | conf |
FTRTFT
|
| 2000 | B | conf |
SAS
|
| 2000 | B | conf |
FASE
|
| 1996 | J | jnl |
Math. Struct. Comput. Sci.
|
| 1995 | — | conf |
SEGRAGRA
|
| 1994 | — | conf |
Theory and Formal Methods
|
| 1993 | — | conf |
PLILP
|