| Year | Rank | Type | Title / Venue / Authors |
|---|---|---|---|
| 2025 | C | conf |
ISC
|
| 2024 | J | jnl |
Frontiers Big Data
|
| 2024 | C | conf |
SECRYPT
|
| 2021 | B | conf |
IM
|
| 2020 | J | jnl |
Applied graph theory to security: A qualitative placement of security solutions within IoT networks.
J. Inf. Secur. Appl.
|
| 2020 | J | jnl |
Sensors
|
| 2020 | J | jnl |
CoRR
|
| 2020 | J | jnl |
Theor. Comput. Sci.
|
| 2019 | Misc | conf |
SEC
|
| 2019 | C | conf |
IPCCC
|
| 2018 | — | conf |
ICB
|
| 2018 | C | conf |
ICISSP
|
| 2017 | C | conf |
ICISSP
|
| 2016 | — | conf |
BIOSIG
|
| 2016 | J | jnl |
IET Biom.
|
| 2016 | — | book |
|
| 2015 | — | conf |
Media Watermarking, Security, and Forensics
|
| 2015 | C | conf |
ICISSP
|
| 2015 | — | conf |
ICISSP (Revised Selected Papers)
|
| 2015 | C | conf |
ICISSP
|
| 2015 | C | conf |
CW
|
| 2015 | J | jnl |
CoRR
|
| 2015 | B | conf |
ARES
|
| 2015 | J | jnl |
CoRR
|
| 2015 | C | conf |
ICISSP
|
| 2013 | J | jnl |
Theor. Comput. Sci.
|
| 2011 | B | conf |
ITW
|
| 2010 | J | jnl |
IEEE Trans. Inf. Theory
|
| 2008 | Misc | conf |
IWSEC
|
| 2007 | B | conf |
ISIT
|
| 2004 | J | jnl |
CoRR
|
| 2002 | A* | conf |
LICS
|
| 2001 | J | jnl |
Inf. Process. Lett.
|
| 2000 | J | jnl |
Bull. Symb. Log.
|
| 1998 | A* | conf |
LICS
|