| Year | Rank | Type | Title / Venue / Authors |
|---|---|---|---|
| 2025 | J | jnl |
Comput. Secur.
|
| 2023 | J | jnl |
DTRAP
|
| 2022 | J | jnl |
Comput. Secur.
|
| 2022 | J | jnl |
Insider-threat detection: Lessons from deploying the CITD tool in three multinational organisations.
J. Inf. Secur. Appl.
|
| 2021 | J | jnl |
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.
|
| 2021 | J | jnl |
DTRAP
|
| 2021 | B | conf |
ARES
|
| 2021 | J | jnl |
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.
|
| 2020 | J | jnl |
IEEE Trans. Knowl. Data Eng.
|
| 2020 | — | conf |
CyberSA
|
| 2020 | J | jnl |
CoRR
|
| 2019 | J | jnl |
CoRR
|
| 2019 | — | conf |
CyberSA
|
| 2019 | J | jnl |
IEEE Access
|
| 2019 | C | conf |
ICISSP
|
| 2019 | — | conf |
ICISSP (Revised Selected Papers)
|
| 2019 | Misc | conf |
WISA
|
| 2019 | J | jnl |
CoRR
|
| 2019 | C | conf |
ICISSP
|
| 2019 | J | jnl |
CoRR
|
| 2019 | — | conf |
ICISSP (Revised Selected Papers)
|
| 2018 | — | conf |
GraMSec
|
| 2018 | J | jnl |
J. Cybersecur.
|
| 2018 | J | jnl |
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.
|
| 2018 | J | jnl |
CoRR
|
| 2018 | B | conf |
ARES
|
| 2018 | J | jnl |
CoRR
|
| 2018 | J | jnl |
Hum. centric Comput. Inf. Sci.
|
| 2017 | — | conf |
HCI (22)
|
| 2017 | J | jnl |
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.
|
| 2017 | J | jnl |
J. Internet Serv. Appl.
|
| 2017 | — | conf |
CyberSA
|
| 2016 | — | conf |
MIST@CCS
|
| 2016 | C | conf |
ICISSP
|
| 2016 | — | conf |
MIST@CCS
|
| 2016 | — | conf |
SocInfo (1)
|
| 2016 | J | jnl |
CoRR
|
| 2016 | — | conf |
IEEE Symposium on Security and Privacy Workshops
|
| 2015 | — | conf |
SIoT
|
| 2014 | — | conf |
HCI (24)
|
| 2014 | J | jnl |
J. Internet Serv. Inf. Secur.
|
| 2013 | — | conf |
TrustCom/ISPA/IUCC
|
| 2013 | C | conf |
PST
|
| 2013 | J | jnl |
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.
|
| 2011 | — | conf |
PrimeLife
|
| 2011 | — | conf |
PrimeLife
|
| 2010 | — | conf |
PrimeLife
|
| 2009 | — | conf |
PrimeLife
|