| Year | Rank | Type | Title / Venue / Authors |
|---|---|---|---|
| 2025 | J | jnl |
Pervasive Mob. Comput.
|
| 2025 | J | jnl |
J. Inf. Secur. Appl.
|
| 2025 | J | jnl |
J. Supercomput.
|
| 2024 | J | jnl |
IEEE Trans. Inf. Forensics Secur.
|
| 2024 | — | conf |
WIFS
|
| 2024 | J | jnl |
Int. J. Hum. Comput. Interact.
|
| 2024 | J | jnl |
J. Supercomput.
|
| 2023 | Misc | conf |
CSICC
|
| 2023 | J | jnl |
J. Inf. Secur. Appl.
|
| 2022 | J | jnl |
CoRR
|
| 2022 | J | jnl |
CoRR
|
| 2021 | J | jnl |
Inf. Sci.
|
| 2020 | J | jnl |
ANOVUL: Detection of logic vulnerabilities in annotated programs via data and control flow analysis.
IET Inf. Secur.
|
| 2020 | J | jnl |
IET Softw.
|
| 2019 | J | jnl |
Inf. Softw. Technol.
|
| 2018 | — | conf |
ISCISC
|
| 2018 | J | jnl |
ISC Int. J. Inf. Secur.
|
| 2018 | J | jnl |
ISC Int. J. Inf. Secur.
|
| 2018 | — | conf |
ISCISC
|
| 2018 | J | jnl |
IET Inf. Secur.
|
| 2017 | J | jnl |
Enterp. Inf. Syst.
|
| 2017 | J | jnl |
ISC Int. J. Inf. Secur.
|
| 2017 | J | jnl |
IEEE Secur. Priv.
|
| 2017 | J | jnl |
ACM Comput. Surv.
|
| 2016 | — | conf |
ISCISC
|
| 2016 | J | jnl |
ISC Int. J. Inf. Secur.
|
| 2014 | J | jnl |
ISC Int. J. Inf. Secur.
|
| 2014 | — | conf |
ISCISC
|
| 2014 | — | conf |
ISCISC
|
| 2014 | — | conf |
ISCISC
|
| 2013 | — | conf |
ISCISC
|
| 2013 | J | jnl |
ISC Int. J. Inf. Secur.
|
| 2011 | — | conf |
KMIS
|
| 2011 | B | conf |
TrustCom
|
| 2011 | J | jnl |
Comput. J.
|
| 2010 | C | conf |
GPC
|
| 2010 | J | jnl |
Comput. Electr. Eng.
|
| 2008 | J | jnl |
J. Inf. Sci. Eng.
|
| 2007 | J | jnl |
Comput. Secur.
|
| 2006 | J | jnl |
Comput. Secur.
|
| 2006 | — | conf |
ICN/ICONS/MCL
|
| 2005 | C | conf |
ISPEC
|
| 2005 | C | conf |
ICICS
|