| Year | Rank | Type | Title / Venue / Authors |
|---|---|---|---|
| 2026 | J | jnl |
Comput. Secur.
|
| 2026 | J | jnl |
Comput. Secur.
|
| 2025 | — | conf |
HCI (49)
|
| 2025 | J | jnl |
Inf.
|
| 2025 | J | jnl |
Comput. Secur.
|
| 2025 | — | conf |
HCI (49)
|
| 2025 | J | jnl |
CoRR
|
| 2024 | J | jnl |
Comput. Secur.
|
| 2024 | J | jnl |
J. Cybersecur.
|
| 2024 | J | jnl |
CoRR
|
| 2024 | J | jnl |
Frontiers Big Data
|
| 2024 | — | conf |
HAISA (1)
|
| 2024 | J | jnl |
Inf. Comput. Secur.
|
| 2024 | J | jnl |
CoRR
|
| 2024 | J | jnl |
DTRAP
|
| 2024 | J | jnl |
CoRR
|
| 2024 | J | jnl |
CoRR
|
| 2024 | J | jnl |
Proc. ACM Hum. Comput. Interact.
|
| 2024 | J | jnl |
Big Data Res.
|
| 2023 | J | jnl |
ACM Comput. Surv.
|
| 2023 | J | jnl |
Comput. Secur.
|
| 2023 | J | jnl |
Frontiers Comput. Sci.
|
| 2023 | J | jnl |
CoRR
|
| 2023 | J | jnl |
IT Prof.
|
| 2023 | — | conf |
HAISA
|
| 2023 | J | jnl |
CoRR
|
| 2023 | J | jnl |
Comput. Secur.
|
| 2023 | J | jnl |
Comput. Secur.
|
| 2023 | — | conf |
HCI (35)
|
| 2023 | J | jnl |
CoRR
|
| 2022 | — | conf |
CHI Extended Abstracts
|
| 2022 | J | jnl |
CoRR
|
| 2022 | J | jnl |
Proc. ACM Hum. Comput. Interact.
|
| 2022 | J | jnl |
CoRR
|
| 2022 | J | jnl |
CoRR
|
| 2022 | Misc | conf |
SAC
|
| 2022 | J | jnl |
Comput. Secur.
|
| 2022 | J | jnl |
Frontiers Comput. Sci.
|
| 2022 | A | conf |
ICWSM
|
| 2022 | J | jnl |
CoRR
|
| 2022 | J | jnl |
CoRR
|
| 2022 | A | conf |
ICWSM
|
| 2022 | J | jnl |
J. Inf. Secur. Appl.
|
| 2022 | J | jnl |
CoRR
|
| 2022 | — | conf |
Cyber Science
|
| 2021 | J | jnl |
Cyberpsychology Behav. Soc. Netw.
|
| 2021 | J | jnl |
Comput. Secur.
|
| 2021 | J | jnl |
CoRR
|
| 2021 | J | jnl |
Comput. Secur.
|
| 2021 | J | jnl |
CoRR
|
| 2021 | J | jnl |
CoRR
|
| 2021 | J | jnl |
CoRR
|
| 2021 | B | conf |
ARES
|
| 2021 | — | conf |
HCI (38)
|
| 2021 | J | jnl |
CoRR
|
| 2021 | — | conf |
CyberSA
|
| 2021 | J | jnl |
CoRR
|
| 2021 | — | conf |
Remote Working Pre- and Post-COVID-19: An Analysis of New Threats and Risks to Security and Privacy.
HCI (39)
|
| 2021 | J | jnl |
Remote Working Pre- and Post-COVID-19: An Analysis of New Threats and Risks to Security and Privacy.
CoRR
|
| 2021 | — | conf |
HCI (38)
|
| 2021 | — | conf |
HAISA
|
| 2021 | J | jnl |
CoRR
|
| 2021 | — | conf |
CUI
|
| 2021 | J | jnl |
CoRR
|
| 2021 | — | conf |
ICWSM Workshops
|
| 2021 | J | jnl |
CoRR
|
| 2021 | — | conf |
ICWSM Workshops
|
| 2021 | — | conf |
HAISA
|
| 2021 | J | jnl |
CoRR
|
| 2020 | — | conf |
EuroS&P Workshops
|
| 2020 | — | conf |
EuroS&P Workshops
|
| 2020 | J | jnl |
CoRR
|
| 2020 | J | jnl |
IEEE Trans. Knowl. Data Eng.
|
| 2020 | J | jnl |
Comput. Secur.
|
| 2020 | J | jnl |
CoRR
|
| 2020 | A | conf |
ICWSM
|
| 2020 | J | jnl |
CoRR
|
| 2020 | J | jnl |
CoRR
|
| 2020 | J | jnl |
Cybersecur.
|
| 2020 | J | jnl |
J. Cybersecur.
|
| 2020 | J | jnl |
CoRR
|
| 2020 | J | jnl |
CoRR
|
| 2020 | — | conf |
CIU
|
| 2020 | J | jnl |
CoRR
|
| 2020 | — | conf |
CyberSA
|
| 2020 | J | jnl |
CoRR
|
| 2019 | J | jnl |
CoRR
|
| 2019 | J | jnl |
CoRR
|
| 2019 | Misc | conf |
WISA
|
| 2019 | J | jnl |
CoRR
|
| 2019 | J | jnl |
CoRR
|
| 2019 | J | jnl |
Comput. Secur.
|
| 2019 | J | jnl |
CoRR
|
| 2019 | J | jnl |
CoRR
|
| 2019 | J | jnl |
CoRR
|
| 2019 | J | jnl |
CoRR
|
| 2019 | J | jnl |
Inf. Comput. Secur.
|
| 2019 | — | conf |
CHI Extended Abstracts
|
| 2019 | J | jnl |
CoRR
|
| 2019 | J | jnl |
CoRR
|
| 2019 | J | jnl |
Comput. Hum. Behav.
|
| 2019 | J | jnl |
CoRR
|
| 2019 | J | jnl |
CoRR
|
| 2019 | J | jnl |
CoRR
|
| 2019 | J | jnl |
CoRR
|
| 2019 | J | jnl |
CoRR
|
| 2019 | J | jnl |
CoRR
|
| 2019 | J | jnl |
J. Inf. Secur. Appl.
|
| 2019 | C | conf |
ISI
|
| 2019 | J | jnl |
CoRR
|
| 2018 | J | jnl |
CoRR
|
| 2018 | C | ed. |
PST
|
| 2018 | J | jnl |
CoRR
|
| 2018 | J | jnl |
J. Cybersecur.
|
| 2018 | — | conf |
MPS@CCS
|
| 2018 | J | jnl |
CoRR
|
| 2018 | J | jnl |
CoRR
|
| 2018 | J | jnl |
CoRR
|
| 2018 | J | jnl |
CoRR
|
| 2018 | J | jnl |
CoRR
|
| 2018 | J | jnl |
CoRR
|
| 2018 | J | jnl |
CoRR
|
| 2018 | J | jnl |
CoRR
|
| 2018 | J | jnl |
CoRR
|
| 2018 | J | jnl |
CoRR
|
| 2018 | J | jnl |
CoRR
|
| 2018 | J | jnl |
Hum. centric Comput. Inf. Sci.
|
| 2017 | — | conf |
A Study into the Cybersecurity Awareness Initiatives for School Learners in South Africa and the UK.
World Conference on Information Security Education
|
| 2017 | — | conf |
HCI (22)
|
| 2017 | J | jnl |
Hum. centric Comput. Inf. Sci.
|
| 2017 | J | jnl |
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.
|
| 2017 | J | jnl |
J. Internet Serv. Appl.
|
| 2017 | C | conf |
PST
|
| 2017 | J | jnl |
IT Prof.
|
| 2017 | — | conf |
BCS HCI
|
| 2017 | — | conf |
Unwinding Ariadne's Identity Thread: Privacy Risks with Fitness Trackers and Online Social Networks.
MPS@CCS
|
| 2016 | — | conf |
MIST@CCS
|
| 2016 | C | conf |
ICISSP
|
| 2016 | J | jnl |
Secur. Informatics
|
| 2016 | — | conf |
HCI (20)
|
| 2016 | J | jnl |
Hum. centric Comput. Inf. Sci.
|
| 2016 | — | conf |
SocInfo (1)
|
| 2016 | J | jnl |
CoRR
|
| 2016 | — | conf |
RTSI
|
| 2016 | — | conf |
HCI (20)
|
| 2016 | — | conf |
BCS HCI
|
| 2016 | — | conf |
Privacy and Identity Management
|
| 2016 | B | conf |
ARES
|
| 2016 | Misc | conf |
SAC
|
| 2016 | — | conf |
EISIC
|
| 2016 | — | conf |
LATINCOM
|
| 2016 | — | conf |
HCI (20)
|
| 2016 | J | jnl |
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.
|
| 2015 | J | jnl |
J. Digit. Forensics Secur. Law
|
| 2015 | C | conf |
CRiSIS
|
| 2015 | J | jnl |
XRDS
|
| 2015 | — | conf |
ICDM Workshops
|
| 2015 | J | jnl |
J. Internet Serv. Inf. Secur.
|
| 2015 | — | conf |
HCI (22)
|
| 2015 | — | conf |
SIoT
|
| 2015 | — | conf |
CIT/IUCC/DASC/PICom
|
| 2015 | — | conf |
ICEIS (2)
|
| 2014 | — | conf |
HCI (24)
|
| 2014 | C | conf |
PST
|
| 2014 | — | conf |
STAST
|
| 2014 | — | conf |
IEEE Symposium on Security and Privacy Workshops
|
| 2013 | — | conf |
TrustCom/ISPA/IUCC
|
| 2013 | C | conf |
PST
|
| 2013 | — | conf |
HCI (27)
|
| 2013 | J | jnl |
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.
|
| 2012 | B | conf |
TrustCom
|
| 2012 | — | conf |
ISCRAM
|
| 2012 | — | conf |
STAST
|
| 2012 | — | conf |
STAST
|
| 2011 | — | conf |
CSS
|
| 2011 | — | conf |
STAST
|
| 2010 | — | — |
|
| 2009 | C | conf |
ICIW
|
| 2009 | — | conf |
ISDF
|
| 2009 | — | conf |
BIS
|