| Year | Rank | Type | Title / Venue / Authors |
|---|---|---|---|
| 2026 | J | jnl |
J. Comput. Virol. Hacking Tech.
|
| 2025 | J | jnl |
CoRR
|
| 2025 | J | jnl |
IEEE Access
|
| 2024 | J | jnl |
J. Comput. Virol. Hacking Tech.
|
| 2024 | C | conf |
ICCE
|
| 2024 | J | jnl |
J. Comput. Virol. Hacking Tech.
|
| 2024 | J | jnl |
J. Comput. Virol. Hacking Tech.
|
| 2023 | J | jnl |
CoRR
|
| 2023 | J | jnl |
CoRR
|
| 2023 | — | conf |
DASC/PiCom/CBDCom/CyberSciTech
|
| 2023 | J | jnl |
CoRR
|
| 2023 | J | jnl |
J. Comput. Virol. Hacking Tech.
|
| 2023 | J | jnl |
CoRR
|
| 2023 | — | conf |
SVCC
|
| 2023 | J | jnl |
J. Comput. Virol. Hacking Tech.
|
| 2022 | — | conf |
SVCC
|
| 2022 | J | jnl |
CoRR
|
| 2022 | J | jnl |
CoRR
|
| 2022 | J | jnl |
CoRR
|
| 2022 | J | jnl |
CoRR
|
| 2022 | J | jnl |
CoRR
|
| 2022 | C | conf |
ICISSP
|
| 2022 | C | conf |
ICISSP
|
| 2022 | — | conf |
SVCC
|
| 2022 | — | ed. |
SVCC
|
| 2022 | — | conf |
SVCC
|
| 2022 | — | conf |
SVCC
|
| 2021 | C | conf |
ICISSP
|
| 2021 | J | jnl |
CoRR
|
| 2021 | J | jnl |
CoRR
|
| 2021 | — | conf |
SVCC
|
| 2021 | J | jnl |
CoRR
|
| 2021 | C | conf |
ICISSP
|
| 2021 | C | conf |
ICISSP
|
| 2021 | J | jnl |
CoRR
|
| 2021 | J | jnl |
CoRR
|
| 2020 | J | jnl |
Array
|
| 2020 | J | jnl |
Inf. Secur. J. A Glob. Perspect.
|
| 2020 | J | jnl |
Expert Syst. Appl.
|
| 2020 | — | — |
|
| 2020 | J | jnl |
J. Comput. Virol. Hacking Tech.
|
| 2019 | C | conf |
ICISSP
|
| 2019 | J | jnl |
CoRR
|
| 2019 | J | jnl |
J. Comput. Virol. Hacking Tech.
|
| 2019 | J | jnl |
Expert Syst. Appl.
|
| 2019 | J | jnl |
J. Comput. Virol. Hacking Tech.
|
| 2019 | J | jnl |
CoRR
|
| 2019 | J | jnl |
CoRR
|
| 2019 | C | conf |
ICISSP
|
| 2018 | C | conf |
ICISSP
|
| 2018 | C | conf |
ICISSP
|
| 2018 | C | conf |
ICISSP
|
| 2018 | — | ch. |
Guide to Vulnerability Analysis for Computer Networks and Systems
|
| 2018 | — | ch. |
Guide to Vulnerability Analysis for Computer Networks and Systems
|
| 2018 | — | conf |
HistoCrypt
|
| 2018 | — | ch. |
Guide to Vulnerability Analysis for Computer Networks and Systems
|
| 2018 | — | conf |
ICETE (1)
|
| 2018 | — | conf |
ICETE (1)
|
| 2018 | — | conf |
ICETE (1)
|
| 2018 | J | jnl |
J. Comput. Virol. Hacking Tech.
|
| 2017 | J | jnl |
J. Comput. Virol. Hacking Tech.
|
| 2017 | J | jnl |
Cryptologia
|
| 2017 | J | jnl |
J. Comput. Virol. Hacking Tech.
|
| 2017 | J | jnl |
Int. J. Secur. Networks
|
| 2017 | C | conf |
ICISSP
|
| 2016 | — | conf |
MALWARE
|
| 2016 | J | jnl |
J. Comput. Virol. Hacking Tech.
|
| 2016 | — | conf |
IWSPA@CODASPY
|
| 2016 | — | conf |
IWSPA@CODASPY
|
| 2016 | J | jnl |
J. Comput. Virol. Hacking Tech.
|