| Year | Rank | Type | Title / Venue / Authors |
|---|---|---|---|
| 2026 | J | jnl |
IEEE Trans. Dependable Secur. Comput.
|
| 2026 | J | jnl |
CoRR
|
| 2026 | J | jnl |
CoRR
|
| 2026 | A* | conf |
CHI
|
| 2025 | J | jnl |
CoRR
|
| 2025 | C | conf |
CloudCom
|
| 2025 | J | jnl |
Empir. Softw. Eng.
|
| 2025 | J | jnl |
Comput. Secur.
|
| 2025 | J | jnl |
IEEE Secur. Priv.
|
| 2025 | A* | conf |
SP
|
| 2025 | — | conf |
ARES (2)
|
| 2025 | J | jnl |
CoRR
|
| 2025 | J | jnl |
Empir. Softw. Eng.
|
| 2025 | J | jnl |
CoRR
|
| 2025 | J | jnl |
CoRR
|
| 2025 | B | conf |
K-CAP
|
| 2025 | J | jnl |
CoRR
|
| 2025 | J | jnl |
Proc. ACM Softw. Eng.
|
| 2025 | — | conf |
NIER@ICSE
|
| 2025 | J | jnl |
CoRR
|
| 2025 | — | conf |
NIER@ICSE
|
| 2024 | J | jnl |
IEEE Trans. Inf. Forensics Secur.
|
| 2024 | J | jnl |
Empir. Softw. Eng.
|
| 2024 | J | jnl |
J. Syst. Softw.
|
| 2024 | J | jnl |
CoRR
|
| 2024 | — | conf |
ICSE Companion
|
| 2024 | J | jnl |
CoRR
|
| 2024 | J | jnl |
CoRR
|
| 2024 | J | jnl |
CoRR
|
| 2024 | J | jnl |
IEEE Secur. Priv.
|
| 2024 | — | conf |
ICSE Companion
|
| 2024 | J | jnl |
Empir. Softw. Eng.
|
| 2024 | A* | conf |
CCS
|
| 2024 | J | jnl |
CoRR
|
| 2024 | J | jnl |
IEEE Secur. Priv.
|
| 2024 | A* | conf |
Using AI Assistants in Software Development: A Qualitative Study on Security Practices and Concerns.
CCS
|
| 2024 | J | jnl |
Using AI Assistants in Software Development: A Qualitative Study on Security Practices and Concerns.
CoRR
|
| 2023 | J | jnl |
IEEE Trans. Inf. Forensics Secur.
|
| 2023 | J | jnl |
CoRR
|
| 2023 | J | jnl |
Empir. Softw. Eng.
|
| 2023 | J | jnl |
CoRR
|
| 2023 | J | jnl |
Commun. ACM
|
| 2023 | J | jnl |
CoRR
|
| 2023 | J | jnl |
Comput. Secur.
|
| 2023 | J | jnl |
Comput. Secur.
|
| 2023 | J | jnl |
IEEE Secur. Priv.
|
| 2023 | J | jnl |
IEEE Trans. Software Eng.
|
| 2023 | J | jnl |
Empir. Softw. Eng.
|
| 2023 | J | jnl |
IEEE Secur. Priv.
|
| 2022 | J | jnl |
IEEE Secur. Priv.
|
| 2022 | J | jnl |
IEEE Secur. Priv.
|
| 2022 | B | conf |
CCGRID
|
| 2022 | — | conf |
CyberSec4Europe
|
| 2022 | J | jnl |
IEEE Secur. Priv.
|
| 2022 | J | jnl |
CoRR
|
| 2022 | J | jnl |
IEEE Trans. Inf. Forensics Secur.
|
| 2022 | J | jnl |
DTRAP
|
| 2022 | J | jnl |
DTRAP
|
| 2022 | B | conf |
ARES
|
| 2022 | J | jnl |
IEEE Secur. Priv.
|
| 2022 | J | jnl |
CoRR
|
| 2022 | B | conf |
ARES
|
| 2022 | J | jnl |
IEEE Secur. Priv.
|
| 2022 | J | jnl |
CoRR
|
| 2022 | J | jnl |
ACM Trans. Sens. Networks
|
| 2022 | C | conf |
Software Engineering
|
| 2022 | J | jnl |
Empir. Softw. Eng.
|
| 2022 | J | jnl |
CoRR
|
| 2022 | B | conf |
CLOUD
|
| 2022 | J | jnl |
CoRR
|
| 2022 | J | jnl |
IEEE Trans. Software Eng.
|
| 2021 | J | jnl |
Proc. Priv. Enhancing Technol.
|
| 2021 | J | jnl |
IEEE Secur. Priv.
|
| 2021 | J | jnl |
IEEE Secur. Priv.
|
| 2021 | — | ch. |
IFIP's Exciting First 60+ Years
|
| 2021 | — | conf |
ESEC/SIGSOFT FSE
|
| 2021 | J | jnl |
Comput. Secur.
|
| 2021 | J | jnl |
IEEE Secur. Priv.
|
| 2021 | — | conf |
APR@ICSE
|
| 2021 | — | conf |
Financial Cryptography (2)
|
| 2021 | — | conf |
ICSE (NIER)
|
| 2021 | J | jnl |
CoRR
|
| 2021 | J | jnl |
IEEE Secur. Priv.
|
| 2021 | A* | conf |
ICSE
|
| 2021 | J | jnl |
CoRR
|
| 2021 | J | jnl |
IEEE Secur. Priv.
|
| 2021 | J | jnl |
IEEE Secur. Priv.
|
| 2020 | A* | conf |
CCS
|
| 2020 | — | conf |
EuroS&P Workshops
|
| 2020 | J | jnl |
IEEE Secur. Priv.
|
| 2020 | J | jnl |
Trans. Emerg. Telecommun. Technol.
|
| 2020 | J | jnl |
Empir. Softw. Eng.
|
| 2020 | — | conf |
ICSE (Companion Volume)
|
| 2020 | J | jnl |
Inf.
|
| 2020 | A* | conf |
CCS
|
| 2020 | — | conf |
EuroS&P Workshops
|
| 2020 | — | conf |
EuroS&P Workshops
|
| 2020 | — | conf |
EuroS&P Workshops
|
| 2019 | J | jnl |
CoRR
|
| 2019 | — | conf |
ITASEC
|
| 2019 | J | jnl |
IEEE Trans. Software Eng.
|
| 2019 | J | jnl |
Secur. Commun. Networks
|
| 2019 | — | conf |
Security Protocols Workshop
|
| 2019 | — | conf |
DLT@ITASEC
|
| 2019 | — | conf |
CyberSA
|
| 2019 | J | jnl |
Sensors
|
| 2019 | J | jnl |
IEEE Secur. Priv.
|
| 2019 | J | jnl |
J. Comput. Virol. Hacking Tech.
|
| 2019 | — | conf |
WF-IoT
|
| 2019 | J | jnl |
Int. J. Softw. Tools Technol. Transf.
|
| 2018 | J | jnl |
CoRR
|
| 2018 | A* | conf |
IEEE Symposium on Security and Privacy
|
| 2018 | A* | conf |
ICSE
|
| 2018 | — | conf |
Security Protocols Workshop
|
| 2018 | — | conf |
Security Protocols Workshop
|
| 2018 | J | jnl |
CoRR
|
| 2018 | J | jnl |
CoRR
|
| 2018 | A | conf |
ESEM
|
| 2017 | B | conf |
ARES
|
| 2017 | A | conf |
ESEM
|
| 2017 | — | conf |
PECCS
|
| 2017 | — | conf |
FDSE
|
| 2017 | A | conf |
ESEM
|
| 2017 | J | jnl |
Empir. Softw. Eng.
|
| 2017 | — | ed. |
REFSQ Workshops
|
| 2017 | J | jnl |
Empir. Softw. Eng.
|
| 2017 | B | conf |
REFSQ
|
| 2017 | — | conf |
SpaCCS
|
| 2017 | — | conf |
ICSE (Companion Volume)
|
| 2017 | J | jnl |
CoRR
|
| 2017 | — | conf |
Security Protocols Workshop
|
| 2016 | J | jnl |
IEEE Secur. Priv.
|
| 2016 | J | jnl |
Empir. Softw. Eng.
|
| 2016 | J | jnl |
IEEE Secur. Priv.
|
| 2016 | — | conf |
ESSoS
|
| 2016 | J | jnl |
IEEE Trans. Emerg. Top. Comput.
|
| 2015 | J | jnl |
IEEE Secur. Priv.
|
| 2015 | A* | conf |
POPL
|
| 2015 | — | conf |
CODASPY
|
| 2015 | B | conf |
REFSQ
|
| 2015 | — | conf |
ECIS
|
| 2015 | B | conf |
ARES
|
| 2015 | — | conf |
EmpiRE
|
| 2014 | B | conf |
ARES
|
| 2014 | A | conf |
RE
|
| 2014 | J | jnl |
IEEE Trans. Software Eng.
|
| 2014 | — | conf |
CSP Forum
|
| 2014 | — | conf |
EmpiRE
|
| 2014 | J | jnl |
Assessing a requirements evolution approach: Empirical studies in the air traffic management domain.
J. Syst. Softw.
|
| 2014 | J | jnl |
ACM Trans. Inf. Syst. Secur.
|
| 2014 | B | conf |
ARES
|
| 2014 | — | ch. |
Engineering Secure Future Internet Services and Systems
|
| 2014 | A | conf |
ACSAC
|
| 2014 | — | conf |
ICTCS
|
| 2014 | J | jnl |
Computer
|
| 2014 | — | conf |
EmpiRE
|
| 2014 | A | conf |
ESEM
|
| 2014 | — | conf |
CSET
|
| 2013 | J | jnl |
CoRR
|
| 2013 | A | conf |
ESEM
|
| 2013 | — | conf |
ESSoS
|
| 2013 | B | conf |
ARES
|
| 2013 | J | jnl |
J. Inf. Secur. Appl.
|
| 2013 | J | jnl |
CoRR
|
| 2013 | — | conf |
CSET
|
| 2013 | J | jnl |
CoRR
|
| 2013 | — | conf |
IEEE Symposium on Security and Privacy Workshops
|
| 2013 | J | jnl |
CoRR
|
| 2013 | A | conf |
AsiaCCS
|
| 2013 | — | conf |
CAiSE Forum
|
| 2012 | — | conf |
BADGERS@CCS
|
| 2012 | — | conf |
ESSoS
|
| 2012 | J | jnl |
CoRR
|
| 2012 | A | conf |
AsiaCCS
|
| 2012 | — | conf |
Assessing a requirements evolution approach: Empirical studies in the Air Traffic Management domain.
EmpiRE
|
| 2012 | — | conf |
FMCO
|
| 2012 | — | conf |
CyberSecurity
|
| 2012 | J | jnl |
Inf. Softw. Technol.
|
| 2012 | J | jnl |
Int. J. Crit. Comput. Based Syst.
|
| 2012 | — | conf |
NordSec
|
| 2012 | J | jnl |
J. Comput. Secur.
|
| 2012 | A | conf |
ICST
|
| 2012 | — | conf |
ESSoS Doctoral Symposium
|
| 2012 | Misc | conf |
SEC
|
| 2011 | — | conf |
POLICY
|
| 2011 | — | conf |
FOSAD
|
| 2011 | — | conf |
CAiSE Forum
|
| 2011 | — | conf |
CAiSE Forum (Selected Papers)
|
| 2011 | — | conf |
ESSoS
|
| 2011 | — | conf |
CAiSE Workshops
|
| 2011 | B | conf |
CEC
|
| 2011 | — | conf |
POLICY
|
| 2011 | A | conf |
Dealing with Known Unknowns: Towards a Game-Theoretic Foundation for Software Requirement Evolution.
CAiSE
|
| 2011 | — | ch. |
Social Modeling for Requirements Engineering
|
| 2011 | J | jnl |
Int. J. Inf. Sec.
|
| 2011 | — | conf |
Future Internet Assembly
|
| 2011 | — | conf |
EmpiRE
|
| 2011 | Misc | conf |
ICISS
|
| 2011 | C | conf |
ISI
|
| 2011 | — | conf |
ServiceWave
|
| 2011 | J | jnl |
Int. J. Secur. Softw. Eng.
|
| 2011 | — | conf |
ESSoS
|
| 2011 | B | conf |
NSS
|
| 2011 | — | conf |
ServiceWave
|
| 2010 | J | jnl |
Trans. Comput. Sci.
|
| 2010 | C | conf |
WISTP
|
| 2010 | — | ed. |
ESSoS
|
| 2010 | J | jnl |
Computer
|
| 2010 | Misc | conf |
CISIS
|
| 2010 | — | conf |
FoSER
|
| 2010 | J | jnl |
J. Comput. Secur.
|
| 2010 | — | conf |
NordSec
|
| 2010 | — | conf |
ISoLA (2)
|
| 2010 | — | ch. |
Advances in Intelligent Information Systems
|
| 2010 | J | jnl |
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.
|
| 2010 | — | conf |
Future Internet Assembly
|
| 2009 | — | conf |
Future Internet Assembly
|
| 2009 | J | jnl |
Comput. Networks
|
| 2009 | — | ed. |
ESSoS
|
| 2009 | J | jnl |
Int. J. Inf. Sec.
|
| 2009 | — | conf |
PrimeLife
|
| 2009 | C | conf |
ICAIL
|
| 2009 | J | jnl |
Artif. Intell. Law
|
| 2009 | — | conf |
RELAW
|
| 2009 | A | conf |
AsiaCCS
|
| 2009 | J | jnl |
J. Log. Algebraic Methods Program.
|
| 2009 | — | book |
Safety and Security in Multiagent Systems
|
| 2009 | — | conf |
ICSOC/ServiceWave
|
| 2009 | — | conf |
BYTECODE@ETAPS
|
| 2009 | — | conf |
NordSec
|
| 2009 | J | jnl |
Comput. Secur.
|
| 2008 | — | conf |
OTM Conferences (2)
|
| 2008 | — | conf |
IFIPTM
|
| 2008 | — | conf |
Formal Aspects in Security and Trust
|
| 2008 | J | jnl |
ERCIM News
|
| 2008 | J | jnl |
ACM Trans. Auton. Adapt. Syst.
|
| 2008 | — | ed. |
NTMS
|
| 2008 | J | jnl |
Sci. Comput. Program.
|
| 2008 | — | ed. |
STM@ESORICS
|
| 2008 | — | ed. |
REM@ESORICS
|
| 2008 | — | conf |
SWS
|
| 2008 | — | conf |
FIS
|
| 2008 | J | jnl |
Inf. Secur. Tech. Rep.
|
| 2008 | — | conf |
PLAS
|
| 2008 | B | conf |
ARES
|
| 2008 | J | jnl |
Towards Systematic Achievement of Compliance in Service-Oriented Architectures: The MASTER Approach.
Wirtschaftsinf.
|
| 2007 | J | jnl |
J. Netw. Syst. Manag.
|
| 2007 | — | conf |
SECPerU
|
| 2007 | — | conf |
CSAW
|
| 2007 | — | conf |
QoP
|
| 2007 | J | jnl |
Autom. Softw. Eng.
|
| 2007 | — | conf |
IFIPTM
|
| 2007 | J | jnl |
Int. J. Softw. Eng. Knowl. Eng.
|
| 2007 | B | conf |
ARES
|
| 2007 | — | conf |
ICSOC Workshops
|
| 2007 | C | conf |
ICAIL
|
| 2007 | C | conf |
IAS
|
| 2007 | — | conf |
STM@ESORICS
|
| 2007 | — | conf |
REM@ESORICS
|
| 2007 | — | conf |
EuroPKI
|
| 2007 | — | conf |
SWS
|
| 2007 | B | conf |
TrustBus
|
| 2007 | — | conf |
POLICY
|
| 2007 | B | conf |
TrustBus
|
| 2006 | J | jnl |
ACM Trans. Auton. Adapt. Syst.
|
| 2006 | A | conf |
CAiSE
|
| 2006 | A | conf |
RE
|
| 2006 | J | jnl |
VLDB J.
|
| 2006 | — | ed. |
QoP
|
| 2006 | — | book |
|
| 2006 | J | jnl |
Int. J. Inf. Sec.
|
| 2006 | — | conf |
STM
|
| 2006 | — | ed. |
iTrust
|
| 2006 | J | jnl |
J. Autom. Reason.
|
| 2005 | J | jnl |
Int. J. Inf. Sec.
|
| 2005 | C | conf |
SACMAT
|
| 2005 | — | conf |
iTrust
|
| 2005 | — | conf |
WPES
|
| 2005 | A | conf |
ESORICS
|
| 2005 | A | conf |
RE
|
| 2005 | — | conf |
iTrust
|
| 2005 | — | conf |
iTrust
|
| 2005 | A | conf |
RE
|
| 2005 | — | conf |
FOSAD
|
| 2005 | — | conf |
ARSPA@ICALP
|
| 2005 | J | jnl |
Comput. Stand. Interfaces
|
| 2004 | B | conf |
ICWE
|
| 2004 | — | conf |
Formal Aspects in Security and Trust
|
| 2004 | — | conf |
WAC
|
| 2004 | — | conf |
EuroPKI
|
| 2004 | Misc | conf |
SEC
|
| 2004 | — | conf |
Security Protocols Workshop
|
| 2004 | — | conf |
Security Protocols Workshop
|
| 2004 | — | conf |
iTrust
|
| 2003 | — | conf |
Security Protocols Workshop
|
| 2003 | — | conf |
XML Security
|
| 2003 | J | jnl |
Discret. Appl. Math.
|
| 2003 | A | conf |
ER
|
| 2003 | J | jnl |
IEEE J. Sel. Areas Commun.
|
| 2002 | — | conf |
Computational Logic: Logic Programming and Beyond
|
| 2002 | A* | conf |
KR
|
| 2002 | A* | conf |
CCS
|
| 2001 | — | conf |
LACPV@CAV
|
| 2001 | A* | conf |
IJCAI
|
| 2001 | A | conf |
IJCAR
|
| 2001 | J | jnl |
ACM Trans. Comput. Log.
|
| 2000 | — | conf |
CSFW
|
| 2000 | J | jnl |
Inf. Comput.
|
| 2000 | J | jnl |
CoRR
|
| 2000 | B | conf |
TABLEAUX
|
| 2000 | J | jnl |
Artif. Intell.
|
| 2000 | A | conf |
ESORICS
|
| 2000 | J | jnl |
J. Autom. Reason.
|
| 2000 | — | conf |
Security Protocols Workshop
|
| 2000 | A* | conf |
KR
|
| 2000 | J | jnl |
J. Autom. Reason.
|
| 2000 | — | conf |
Computational Logic
|
| 2000 | J | jnl |
Theor. Comput. Sci.
|
| 1999 | B | conf |
TABLEAUX
|
| 1999 | B | conf |
TABLEAUX
|
| 1999 | A* | conf |
IJCAI
|
| 1998 | — | conf |
AAAI/IAAI
|
| 1998 | A | conf |
ECAI
|
| 1998 | B | conf |
TABLEAUX
|
| 1998 | J | jnl |
J. Log. Comput.
|
| 1997 | — | conf |
AI*IA
|
| 1997 | — | conf |
ECP
|
| 1997 | — | conf |
ECSQARU-FAPR
|
| 1997 | B | conf |
TABLEAUX
|
| 1996 | B | conf |
JELIA
|
| 1996 | B | conf |
ICTAI
|
| 1996 | — | conf |
AAAI/IAAI, Vol. 1
|
| 1996 | — | conf |
Description Logics
|
| 1996 | A | conf |
CADE
|
| 1994 | A | conf |
CADE
|