| Year | Rank | Type | Title / Venue / Authors |
|---|---|---|---|
| 2025 | J | jnl |
Entropy
|
| 2024 | — | conf |
MILCOM
|
| 2024 | — | conf |
AAAI Spring Symposia
|
| 2023 | J | jnl |
Entropy
|
| 2022 | J | jnl |
Entropy
|
| 2021 | — | ch. |
Engineering Artificially Intelligent Systems
|
| 2018 | J | jnl |
J. Softw. Evol. Process.
|
| 2018 | — | conf |
AAAI Spring Symposia
|
| 2018 | — | conf |
AAAI Workshops
|
| 2018 | — | conf |
AAAI Spring Symposia
|
| 2017 | — | ch. |
Autonomy and Artificial Intelligence
|
| 2016 | C | conf |
ACC
|
| 2016 | — | conf |
AAAI Spring Symposia
|
| 2016 | — | conf |
AAAI Spring Symposia
|
| 2016 | — | conf |
AAAI Spring Symposia
|
| 2016 | — | ch. |
Context-Enhanced Information Fusion
|
| 2016 | J | jnl |
Soc. Netw. Anal. Min.
|
| 2016 | — | conf |
HASE
|
| 2015 | — | conf |
AAAI Spring Symposia
|
| 2015 | — | ch. |
Cyber Warfare
|
| 2015 | — | conf |
AAAI Spring Symposia
|
| 2015 | — | conf |
ICC
|
| 2015 | — | conf |
HICSS
|
| 2014 | C | conf |
CollaborateCom
|
| 2014 | Misc | conf |
CISS
|
| 2014 | — | conf |
Complex Adaptive Systems
|
| 2014 | — | conf |
COMM
|
| 2013 | Misc | conf |
CISS
|
| 2013 | Misc | conf |
CISS
|
| 2012 | Misc | conf |
CISS
|
| 2012 | J | jnl |
IEEE Trans. Inf. Forensics Secur.
|
| 2011 | — | conf |
NTMS
|
| 2011 | Misc | conf |
CISS
|
| 2010 | J | jnl |
Theor. Comput. Sci.
|
| 2010 | Misc | conf |
CISS
|
| 2010 | C | conf |
ISITA
|
| 2010 | Misc | conf |
CISS
|
| 2009 | Misc | conf |
CISS
|
| 2008 | C | conf |
IPCCC
|
| 2006 | B | conf |
MFPS
|
| 2006 | J | jnl |
SIAM Rev.
|
| 2006 | — | conf |
Information Hiding
|
| 2006 | — | conf |
ACST
|
| 2005 | — | conf |
MM&Sec
|
| 2005 | A | conf |
ACSAC
|
| 2004 | A | conf |
Privacy Enhancing Technologies
|
| 2003 | J | jnl |
Int. J. Artif. Intell. Tools
|
| 2003 | — | conf |
WPES
|
| 2003 | A | conf |
Privacy Enhancing Technologies
|
| 2002 | — | conf |
Information Hiding
|
| 2002 | B | conf |
DBSec
|
| 2002 | B | conf |
ICTAI
|
| 2002 | C | conf |
NSPW
|
| 2001 | — | ed. |
Information Hiding
|
| 2001 | B | conf |
DBSec
|
| 2000 | C | conf |
NSPW
|
| 2000 | B | conf |
DBSec
|
| 1999 | B | conf |
DBSec
|
| 1999 | — | conf |
Information Hiding
|
| 1998 | J | jnl |
IEEE Trans. Inf. Theory
|
| 1998 | B | conf |
DBSec
|
| 1998 | J | jnl |
Computer
|
| 1998 | C | conf |
Workshop on New Security Paradigms
|
| 1997 | A | conf |
ACSAC
|
| 1997 | C | conf |
NSPW
|
| 1997 | C | conf |
ICICS
|
| 1996 | A | conf |
ACSAC
|
| 1996 | J | jnl |
IEEE Trans. Software Eng.
|
| 1996 | — | conf |
HASE
|
| 1996 | — | conf |
S&P
|
| 1996 | — | conf |
Information Hiding
|
| 1995 | — | conf |
S&P
|
| 1995 | B | conf |
DBSec
|
| 1994 | — | conf |
S&P
|
| 1993 | A* | conf |
CCS
|
| 1993 | J | jnl |
SIAM Rev.
|
| 1992 | — | conf |
CSFW
|
| 1992 | J | jnl |
IEEE Trans. Inf. Theory
|
| 1992 | — | conf |
S&P
|
| 1991 | — | conf |
CSFW
|
| 1991 | — | conf |
S&P
|
| 1990 | — | conf |
CSFW
|