| Year | Rank | Type | Title / Venue / Authors |
|---|---|---|---|
| 2016 | J | jnl |
CoRR
|
| 2012 | A | conf |
ACSAC
|
| 2011 | A* | conf |
IEEE Symposium on Security and Privacy
|
| 2010 | — | book |
Surreptitious Software - Obfuscation, Watermarking, and Tamperproofing for Software Protection.
|
| 2009 | A | conf |
ICPC
|
| 2009 | J | jnl |
Autom. Softw. Eng.
|
| 2008 | C | conf |
PDP
|
| 2008 | — | conf |
QoP
|
| 2007 | C | conf |
SCAM
|
| 2004 | — | conf |
ACSW
|
| 2004 | — | conf |
Information Hiding
|
| 2003 | — | conf |
SOFTVIS
|
| 2002 | — | conf |
ACSC
|