| Year | Rank | Type | Title / Venue / Authors |
|---|---|---|---|
| 2025 | J | jnl |
CoRR
|
| 2025 | J | jnl |
J. Big Data
|
| 2025 | J | jnl |
IEEE Internet Things Mag.
|
| 2025 | B | conf |
NOMS
|
| 2025 | J | jnl |
CoRR
|
| 2025 | J | jnl |
IEEE Trans. Dependable Secur. Comput.
|
| 2025 | — | conf |
ACSAC Workshops
|
| 2025 | C | conf |
ACC
|
| 2025 | J | jnl |
CoRR
|
| 2024 | — | conf |
CSET @ USENIX Security Symposium
|
| 2024 | — | conf |
ICC
|
| 2024 | B | conf |
NCA
|
| 2024 | B | conf |
ARES
|
| 2024 | J | jnl |
IEEE Trans. Netw. Serv. Manag.
|
| 2024 | — | conf |
DSN-S
|
| 2024 | J | jnl |
CoRR
|
| 2024 | J | jnl |
CoRR
|
| 2024 | — | conf |
ICC Workshops
|
| 2024 | J | jnl |
IEEE Internet Things Mag.
|
| 2024 | J | jnl |
IEEE Trans. Netw. Serv. Manag.
|
| 2024 | A* | conf |
SP
|
| 2024 | J | jnl |
CoRR
|
| 2024 | J | jnl |
Comput. Secur.
|
| 2024 | J | jnl |
P4BS: Leveraging Passive Measurements From P4 Switches to Dynamically Modify a Router's Buffer Size.
IEEE Trans. Netw. Serv. Manag.
|
| 2023 | J | jnl |
Comput. Secur.
|
| 2023 | J | jnl |
IEEE Commun. Mag.
|
| 2023 | A | conf |
EuroS&P
|
| 2023 | J | jnl |
CoRR
|
| 2023 | A* | conf |
NDSS
|
| 2023 | B | conf |
NOMS
|
| 2023 | J | jnl |
CoRR
|
| 2023 | — | conf |
ICC
|
| 2023 | — | conf |
ACNS Workshops
|
| 2023 | J | jnl |
CoRR
|
| 2023 | J | jnl |
IEEE Trans. Netw. Serv. Manag.
|
| 2023 | B | conf |
WiMob
|
| 2023 | J | jnl |
CoRR
|
| 2023 | — | conf |
CCE
|
| 2023 | — | conf |
ICC
|
| 2023 | J | jnl |
IEEE Commun. Mag.
|
| 2023 | — | conf |
ICC
|
| 2023 | J | jnl |
CoRR
|
| 2023 | J | jnl |
CoRR
|
| 2023 | — | conf |
ICDF2C (2)
|
| 2022 | B | conf |
NSS
|
| 2022 | B | conf |
ARES
|
| 2022 | J | jnl |
Digit. Investig.
|
| 2022 | J | jnl |
Comput. Networks
|
| 2022 | — | conf |
CF
|
| 2022 | A | conf |
AsiaCCS
|
| 2022 | J | jnl |
IEEE Trans. Netw. Serv. Manag.
|
| 2022 | — | book |
|
| 2022 | B | conf |
NOMS
|
| 2022 | — | conf |
ESORICS (1)
|
| 2022 | J | jnl |
IEEE Trans. Dependable Secur. Comput.
|
| 2022 | A* | conf |
NDSS
|
| 2022 | — | conf |
BlackSeaCom
|
| 2022 | J | jnl |
IEEE Trans. Netw. Serv. Manag.
|
| 2022 | J | jnl |
Comput. Secur.
|
| 2022 | — | conf |
BlackSeaCom
|
| 2022 | — | book |
|
| 2021 | J | jnl |
IEEE Trans. Netw. Serv. Manag.
|
| 2021 | B | conf |
IWCMC
|
| 2021 | J | jnl |
IEEE Netw. Lett.
|
| 2021 | J | jnl |
A behavioral-based forensic investigation approach for analyzing attacks on water plants using GANs.
Digit. Investig.
|
| 2021 | J | jnl |
IEEE Access
|
| 2021 | J | jnl |
CoRR
|
| 2021 | B | conf |
GLOBECOM
|
| 2021 | — | conf |
NTMS
|
| 2021 | — | conf |
ISPA/BDCloud/SocialCom/SustainCom
|
| 2021 | A | conf |
DSN
|
| 2021 | J | jnl |
Digit. Investig.
|
| 2020 | J | jnl |
IEEE Trans. Ind. Informatics
|
| 2020 | — | conf |
TSP
|
| 2020 | J | jnl |
IEEE Trans. Inf. Forensics Secur.
|
| 2020 | — | conf |
TSP
|
| 2020 | J | jnl |
Digit. Investig.
|
| 2020 | J | jnl |
J. Big Data
|
| 2020 | J | jnl |
Comput. Commun.
|
| 2020 | — | book |
|
| 2020 | — | conf |
ICC
|
| 2020 | J | jnl |
ACM Trans. Manag. Inf. Syst.
|
| 2020 | — | conf |
TSP
|
| 2020 | — | conf |
ICC
|
| 2020 | J | jnl |
Comput. Secur.
|
| 2020 | J | jnl |
ACM Trans. Manag. Inf. Syst.
|
| 2020 | J | jnl |
IEEE Netw. Lett.
|
| 2020 | B | conf |
NetSoft
|
| 2019 | J | jnl |
IEEE Commun. Surv. Tutorials
|
| 2019 | — | conf |
A Flow-Based Entropy Characterization of a NATed Network and Its Application on Intrusion Detection.
ICC
|
| 2019 | J | jnl |
IEEE Access
|
| 2019 | — | conf |
SDS
|
| 2019 | J | jnl |
IEEE Trans. Big Data
|
| 2019 | J | jnl |
Digit. Investig.
|
| 2019 | B | conf |
ARES
|
| 2019 | J | jnl |
IEEE Access
|
| 2019 | J | jnl |
IEEE Commun. Surv. Tutorials
|
| 2019 | — | conf |
TSP
|
| 2019 | B | conf |
ARES
|
| 2019 | J | jnl |
CoRR
|
| 2019 | J | jnl |
Digit. Investig.
|
| 2019 | — | conf |
TSP
|
| 2019 | J | jnl |
IEEE Commun. Mag.
|
| 2019 | J | jnl |
IEEE Commun. Surv. Tutorials
|
| 2019 | J | jnl |
Comput. Commun.
|
| 2018 | B | conf |
IWCMC
|
| 2018 | B | conf |
ARES
|
| 2018 | J | jnl |
IEEE Trans. Dependable Secur. Comput.
|
| 2018 | — | conf |
ICC
|
| 2018 | J | jnl |
CoRR
|
| 2018 | — | conf |
GLOBECOM Workshops
|
| 2018 | — | conf |
TSP
|
| 2018 | — | conf |
ICC
|
| 2018 | A | conf |
DSN
|
| 2018 | J | jnl |
IEEE Commun. Mag.
|
| 2018 | — | ch. |
Computer and Network Security Essentials
|
| 2018 | B | conf |
IWCMC
|
| 2018 | B | conf |
IWCMC
|
| 2018 | J | jnl |
J. Inf. Secur. Appl.
|
| 2018 | Misc | conf |
IRI
|
| 2017 | B | conf |
PIMRC
|
| 2017 | J | jnl |
Digit. Investig.
|
| 2017 | J | jnl |
IEEE Netw.
|
| 2017 | J | jnl |
IEEE Commun. Mag.
|
| 2017 | A* | conf |
NDSS
|
| 2017 | B | conf |
IWCMC
|
| 2017 | B | conf |
ARES
|
| 2017 | — | conf |
MT-ITS
|
| 2016 | — | conf |
NTMS
|
| 2016 | J | jnl |
Comput. Networks
|
| 2016 | — | conf |
ICC
|
| 2016 | — | conf |
Behavioral Service Graphs: A Big Data Approach for Prompt Investigation of Internet-Wide Infections.
NTMS
|
| 2016 | — | conf |
ICC
|
| 2016 | — | conf |
NTMS
|
| 2016 | — | conf |
NTMS
|
| 2016 | J | jnl |
CoRR
|
| 2015 | B | conf |
ARES
|
| 2015 | J | jnl |
Comput. Commun.
|
| 2015 | J | jnl |
Wirel. Commun. Mob. Comput.
|
| 2014 | — | conf |
INFOCOM Workshops
|
| 2014 | J | jnl |
IEEE Commun. Surv. Tutorials
|
| 2014 | — | conf |
NTMS
|
| 2014 | — | conf |
ICC
|
| 2014 | J | jnl |
Digit. Investig.
|
| 2014 | J | jnl |
Comput. Secur.
|
| 2013 | B | conf |
ARES
|
| 2013 | J | jnl |
Secur. Commun. Networks
|
| 2013 | J | jnl |
Comput. Networks
|
| 2013 | J | jnl |
IEEE Commun. Mag.
|
| 2013 | J | jnl |
CoRR
|
| 2013 | B | conf |
IWCMC
|
| 2013 | B | conf |
NCA
|
| 2012 | — | conf |
ICC
|
| 2012 | C | conf |
CRiSIS
|