| Year | Rank | Type | Title / Venue / Authors |
|---|---|---|---|
| 2025 | J | jnl |
CoRR
|
| 2025 | — | conf |
MECO
|
| 2025 | — | conf |
ICPS
|
| 2025 | J | jnl |
Int. J. Inf. Sec.
|
| 2025 | — | conf |
WISEC
|
| 2024 | J | jnl |
Future Internet
|
| 2024 | J | jnl |
Ann. des Télécommunications
|
| 2024 | J | jnl |
IEEE Access
|
| 2024 | J | jnl |
IEEE Access
|
| 2023 | J | jnl |
J. Cyber Secur. Mobil.
|
| 2023 | — | ch. |
Emerging Trends in Cybersecurity Applications
|
| 2022 | J | jnl |
EAI Endorsed Trans. Cloud Syst.
|
| 2022 | J | jnl |
Concurr. Comput. Pract. Exp.
|
| 2022 | J | jnl |
CoRR
|
| 2021 | — | conf |
ICAART (1)
|
| 2021 | J | jnl |
Int. J. Inf. Priv. Secur. Integr.
|
| 2021 | C | conf |
CRiSIS
|
| 2021 | — | conf |
MOBILESoft@ICSE
|
| 2021 | J | jnl |
CoRR
|
| 2019 | — | conf |
COMPSAC (1)
|
| 2018 | — | conf |
Countering Intrusiveness Using New Security-Centric Ranking Algorithm Built on Top of Elasticsearch.
TrustCom/BigDataSE
|
| 2017 | — | conf |
CIC
|
| 2017 | — | conf |
CIC
|
| 2016 | — | conf |
CIC
|
| 2016 | — | conf |
CIC
|
| 2014 | A* | conf |
CCS
|
| 2014 | — | conf |
CODASPY
|
| 2014 | — | conf |
IEEE MS
|
| 2013 | — | conf |
SEGS@CCS
|
| 2013 | C | conf |
CollaborateCom
|
| 2013 | — | conf |
IEEE SCC
|