| Year | Rank | Type | Title / Venue / Authors |
|---|---|---|---|
| 2012 | J | jnl |
Int. J. Softw. Eng. Knowl. Eng.
|
| 2009 | J | jnl |
J. Comput. Virol.
|
| 2008 | — | conf |
Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security
|
| 2008 | C | conf |
SEKE
|
| 2006 | B | conf |
LCN
|
| 2006 | B | conf |
LCN
|
| 2005 | J | jnl |
IEEE Secur. Priv.
|
| 2005 | Misc | conf |
WSC
|
| 2005 | — | conf |
ACM Southeast Regional Conference (2)
|
| 2004 | B | conf |
LCN
|
| 2004 | B | conf |
LCN
|
| 2003 | — | conf |
ITCC
|
| 2003 | — | conf |
SAINT
|
| 1995 | J | jnl |
IBM Syst. J.
|
| 1994 | — | conf |
HPN
|