| Year | Rank | Type | Title / Venue / Authors |
|---|---|---|---|
| 2026 | J | jnl |
CoRR
|
| 2025 | J | jnl |
Artif. Intell. Law
|
| 2024 | J | jnl |
CoRR
|
| 2024 | J | jnl |
IEEE Access
|
| 2023 | J | jnl |
J. Artif. Intell. Res.
|
| 2023 | J | jnl |
Neurocomputing
|
| 2023 | — | conf |
FAccT
|
| 2022 | J | jnl |
IEEE Comput. Intell. Mag.
|
| 2022 | J | jnl |
CoRR
|
| 2021 | — | conf |
IWBF
|
| 2021 | — | conf |
FAccT
|
| 2020 | — | conf |
ICDF2C
|
| 2019 | C | conf |
ICISSP
|
| 2018 | J | jnl |
Comput. Secur.
|
| 2018 | J | jnl |
Comput. Law Secur. Rev.
|
| 2017 | J | jnl |
IEEE Trans. Inf. Forensics Secur.
|
| 2017 | J | jnl |
IEEE Trans. Inf. Forensics Secur.
|
| 2017 | — | conf |
ICCST
|
| 2017 | J | jnl |
Comput. Law Secur. Rev.
|
| 2017 | — | conf |
Privacy and Identity Management
|
| 2017 | — | conf |
SCVT
|
| 2016 | J | jnl |
J. Cryptogr. Eng.
|
| 2016 | — | conf |
MIPRO
|
| 2015 | — | conf |
MIPRO
|
| 2015 | J | jnl |
Secur. Commun. Networks
|
| 2015 | A | conf |
CHES
|
| 2015 | B | conf |
IWCMC
|
| 2014 | — | conf |
ICCST
|
| 2014 | — | conf |
Practical Interception of DECT Encrypted Voice Communication in Unified Communications Environments.
JISIC
|
| 2014 | — | conf |
ICCST
|