| Year | Rank | Type | Title / Venue / Authors |
|---|---|---|---|
| 2022 | J | jnl |
ACM Comput. Surv.
|
| 2021 | J | jnl |
IET Inf. Secur.
|
| 2021 | J | jnl |
Comput.
|
| 2021 | C | conf |
CARDIS
|
| 2020 | J | jnl |
Softw. Pract. Exp.
|
| 2020 | — | conf |
ICETE (2)
|
| 2020 | J | jnl |
CoRR
|
| 2020 | J | jnl |
J. Comput. Virol. Hacking Tech.
|
| 2020 | — | conf |
EuroS&P Workshops
|
| 2019 | J | jnl |
Int. J. Crit. Comput. Based Syst.
|
| 2019 | — | ed. |
SecITC
|
| 2019 | — | conf |
IWBIS
|
| 2019 | — | conf |
FPS
|
| 2019 | J | jnl |
Int. J. Inf. Sec.
|
| 2019 | B | conf |
WiMob
|
| 2019 | C | conf |
CRiSIS
|
| 2018 | J | jnl |
Int. J. Interact. Mob. Technol.
|
| 2018 | — | conf |
CS2@HiPEAC
|
| 2018 | B | conf |
ARES
|
| 2018 | J | jnl |
J. Exp. Theor. Artif. Intell.
|
| 2018 | — | conf |
SecITC
|
| 2018 | — | conf |
FPS
|
| 2018 | B | conf |
ARES
|
| 2018 | C | ed. |
CRiSIS
|
| 2018 | — | conf |
ICETE (2)
|
| 2018 | — | conf |
FPS
|
| 2018 | J | jnl |
Int. J. Inf. Sec.
|
| 2017 | J | jnl |
Int. J. Crit. Comput. Based Syst.
|
| 2017 | — | conf |
TrustCom/BigDataSE/ICESS
|
| 2017 | J | jnl |
J. Comput. Virol. Hacking Tech.
|
| 2017 | — | conf |
NordSec
|
| 2017 | Misc | conf |
SEC
|
| 2017 | Misc | conf |
ICISS
|
| 2017 | C | conf |
WISTP
|
| 2017 | C | conf |
Real-Time Detection and Reaction to Activity Hijacking Attacks in Android Smartphones (Short Paper).
PST
|
| 2017 | J | jnl |
Comput. Secur.
|
| 2017 | C | ed. |
CRiSIS
|
| 2017 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2017 | J | jnl |
J. Cryptogr. Eng.
|
| 2016 | C | conf |
CRiSIS
|
| 2016 | C | conf |
SECRYPT
|
| 2016 | — | conf |
SECITC
|
| 2016 | C | conf |
CRiSIS
|
| 2016 | C | conf |
WISTP
|
| 2016 | C | conf |
CARDIS
|
| 2016 | C | conf |
ICISSP
|
| 2016 | J | jnl |
ERCIM News
|
| 2015 | C | conf |
VECoS
|
| 2015 | — | conf |
C2SI
|
| 2015 | — | conf |
C2SI
|
| 2015 | B | conf |
SEFM
|
| 2015 | C | conf |
IAS
|
| 2015 | J | jnl |
Comput. Secur.
|
| 2014 | C | conf |
SECRYPT
|
| 2014 | — | conf |
CIST
|
| 2014 | C | conf |
CARDIS
|
| 2014 | C | conf |
CARDIS
|
| 2014 | J | jnl |
J. Comput. Virol. Hacking Tech.
|
| 2014 | J | jnl |
Int. J. Trust. Manag. Comput. Commun.
|
| 2013 | C | ed. |
CRiSIS
|
| 2013 | C | conf |
CRiSIS
|
| 2013 | — | conf |
SSCC
|
| 2013 | B | conf |
IFM
|
| 2013 | C | conf |
CRiSIS
|
| 2013 | J | jnl |
Int. J. Secur. Softw. Eng.
|
| 2013 | J | jnl |
J. Inf. Secur. Appl.
|
| 2013 | J | jnl |
J. Inf. Secur. Appl.
|
| 2013 | B | conf |
SAFECOMP
|
| 2012 | C | ed. |
CRiSIS
|
| 2012 | — | conf |
SNDS
|
| 2012 | B | conf |
DBSec
|
| 2012 | C | conf |
CRiSIS
|
| 2012 | — | conf |
Cryptography and Security
|
| 2012 | — | conf |
SCSS
|
| 2012 | B | conf |
ARES
|
| 2011 | C | conf |
CRiSIS
|
| 2011 | — | ch. |
Encyclopedia of Cryptography and Security (2nd Ed.)
|
| 2011 | C | conf |
CARDIS
|
| 2011 | B | conf |
ARES
|
| 2011 | C | conf |
CARDIS
|
| 2011 | — | conf |
ICDE Workshops
|
| 2011 | — | conf |
WIFS
|
| 2010 | C | conf |
CRiSIS
|
| 2010 | — | conf |
FGIT
|
| 2010 | J | jnl |
J. Comput. Virol.
|
| 2010 | J | jnl |
J. Autom. Reason.
|
| 2010 | C | ed. |
CARDIS
|
| 2009 | — | conf |
WESS
|
| 2006 | — | ed. |
CASSIS
|
| 2006 | — | conf |
FMCO
|
| 2005 | — | ed. |
CASSIS
|
| 2004 | A* | conf |
ASE
|
| 2004 | C | conf |
CARDIS
|
| 2003 | — | conf |
FME
|
| 2002 | J | jnl |
J. Comput. Secur.
|
| 2002 | — | conf |
ACM SIGOPS European Workshop
|
| 2000 | — | conf |
ZB
|
| 2000 | A | conf |
ESORICS
|
| 2000 | — | conf |
Java Card Workshop
|
| 1999 | — | conf |
Workshop on Secure Architectures and Information Flow
|
| 1999 | — | conf |
ESEC / SIGSOFT FSE
|
| 1999 | — | conf |
ECOOP Workshops
|
| 1999 | J | jnl |
Inf. Secur. Tech. Rep.
|
| 1998 | C | conf |
CARDIS
|
| 1996 | — | conf |
Euro-Par, Vol. II
|