| Year | Rank | Type | Title / Venue / Authors |
|---|---|---|---|
| 2025 | J | jnl |
CoRR
|
| 2024 | A* | conf |
Flash: A Comprehensive Approach to Intrusion Detection via Provenance Graph Representation Learning.
SP
|
| 2020 | J | jnl |
Eur. J. Oper. Res.
|
| 2019 | A | conf |
ICST
|
| 2019 | J | jnl |
CoRR
|
| 2014 | C | conf |
ICICS
|
| 2014 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2014 | J | jnl |
CoRR
|
| 2014 | B | conf |
ACNS
|
| 2013 | — | conf |
ICITS
|
| 2013 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2013 | J | jnl |
J. Inf. Secur. Appl.
|
| 2013 | J | jnl |
CoRR
|
| 2012 | — | — |
|
| 2012 | — | conf |
FPS
|
| 2011 | — | conf |
ICITS
|
| 2011 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2011 | — | conf |
FPS
|
| 2011 | A* | conf |
EUROCRYPT
|
| 2011 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2010 | J | jnl |
CoRR
|
| 2010 | C | conf |
ISITA
|
| 2010 | J | jnl |
CoRR
|
| 2010 | C | conf |
ISITA
|
| 2009 | J | jnl |
IET Inf. Secur.
|
| 2009 | J | jnl |
Int. J. Softw. Sci. Comput. Intell.
|