| Year | Rank | Type | Title / Venue / Authors |
|---|---|---|---|
| 2026 | A* | conf |
CHI
|
| 2026 | J | jnl |
Hum. Comput. Interact.
|
| 2025 | J | jnl |
Digit. Soc.
|
| 2025 | — | conf |
ECIS
|
| 2025 | — | conf |
EWAF
|
| 2025 | B | conf |
Creativity & Cognition
|
| 2025 | A* | conf |
CHI
|
| 2025 | B | conf |
HAI
|
| 2025 | A* | conf |
NDSS
|
| 2025 | J | jnl |
IEEE Access
|
| 2025 | — | conf |
EWAF
|
| 2024 | J | jnl |
IEEE Pervasive Comput.
|
| 2024 | A | conf |
ACSAC
|
| 2024 | — | conf |
FAccT
|
| 2024 | J | jnl |
IEEE Access
|
| 2024 | — | conf |
FAccT
|
| 2024 | — | conf |
EWAF
|
| 2024 | — | conf |
CSCW Companion
|
| 2024 | J | jnl |
CoRR
|
| 2024 | J | jnl |
Proc. ACM Hum. Comput. Interact.
|
| 2024 | — | conf |
AMCIS
|
| 2024 | — | conf |
NAACL-HLT (Findings)
|
| 2024 | J | jnl |
CoRR
|
| 2024 | A* | conf |
NeurIPS
|
| 2024 | J | jnl |
Digit. Gov. Res. Pract.
|
| 2024 | — | conf |
AIES (1)
|
| 2024 | J | jnl |
IEEE Trans. Inf. Forensics Secur.
|
| 2023 | — | conf |
EWAF
|
| 2023 | J | jnl |
Proc. ACM Hum. Comput. Interact.
|
| 2023 | A* | conf |
USENIX Security Symposium
|
| 2023 | J | jnl |
CoRR
|
| 2023 | J | jnl |
CoRR
|
| 2023 | J | jnl |
Bus. Inf. Syst. Eng.
|
| 2023 | J | jnl |
Proc. Priv. Enhancing Technol.
|
| 2023 | — | conf |
Asian CHI
|
| 2023 | — | conf |
GoodIT
|
| 2023 | C | conf |
ICIS
|
| 2023 | J | jnl |
Games
|
| 2023 | A | conf |
ACSAC
|
| 2023 | A* | conf |
WWW
|
| 2023 | J | jnl |
CoRR
|
| 2023 | A* | conf |
CCS
|
| 2023 | J | jnl |
CoRR
|
| 2023 | J | jnl |
Proc. ACM Hum. Comput. Interact.
|
| 2022 | — | conf |
A Hierarchical Macroeconomic Copula Model for Cyber Damages Based on Current Cyber Insurance Prices.
SciSec
|
| 2022 | J | jnl |
Proc. Priv. Enhancing Technol.
|
| 2022 | — | conf |
EAAMO
|
| 2022 | A | conf |
ICWSM
|
| 2022 | J | jnl |
Proc. Priv. Enhancing Technol.
|
| 2022 | A | conf |
RAID
|
| 2022 | J | jnl |
Proc. Priv. Enhancing Technol.
|
| 2022 | J | jnl |
IEEE Secur. Priv.
|
| 2022 | Misc | conf |
MuC
|
| 2022 | C | conf |
AIES
|
| 2022 | J | jnl |
Proc. Priv. Enhancing Technol.
|
| 2022 | J | jnl |
ACM Trans. Intell. Syst. Technol.
|
| 2022 | C | conf |
AIES
|
| 2022 | — | conf |
FAccT
|
| 2022 | J | jnl |
J. Cybersecur. Priv.
|
| 2021 | C | conf |
AIES
|
| 2021 | J | jnl |
Proc. Priv. Enhancing Technol.
|
| 2021 | A* | conf |
ASE
|
| 2021 | J | jnl |
Inform. Spektrum
|
| 2021 | J | jnl |
J. Cybersecur.
|
| 2021 | J | jnl |
IEEE Trans. Software Eng.
|
| 2021 | J | jnl |
IEEE Secur. Priv.
|
| 2021 | A* | conf |
SP
|
| 2021 | A* | conf |
CCS
|
| 2021 | J | jnl |
Inform. Spektrum
|
| 2021 | — | conf |
ECIS
|
| 2021 | J | jnl |
Proc. ACM Hum. Comput. Interact.
|
| 2021 | A | conf |
RAID
|
| 2020 | J | jnl |
Proc. Priv. Enhancing Technol.
|
| 2020 | A* | conf |
WWW
|
| 2020 | J | jnl |
CoRR
|
| 2020 | — | conf |
eCrime
|
| 2020 | J | jnl |
Inf. Comput. Secur.
|
| 2020 | — | conf |
STM
|
| 2020 | — | conf |
DETIPS/DeSECSys/MPS/SPOSE@ESORICS
|
| 2020 | — | conf |
HAISA
|
| 2020 | Misc | conf |
MuC
|
| 2020 | J | jnl |
First Monday
|
| 2020 | A | conf |
ACSAC
|
| 2019 | J | jnl |
Int. J. Commun. Syst.
|
| 2019 | J | jnl |
CoRR
|
| 2019 | A | conf |
ACSAC
|
| 2019 | — | conf |
FAT
|
| 2019 | J | jnl |
CoRR
|
| 2019 | A* | conf |
USENIX Security Symposium
|
| 2019 | A* | conf |
NDSS
|
| 2019 | J | jnl |
CoRR
|
| 2019 | J | jnl |
CoRR
|
| 2019 | A* | conf |
ICSE
|
| 2019 | J | jnl |
IEEE ACM Trans. Comput. Biol. Bioinform.
|
| 2019 | — | conf |
eCrime
|
| 2019 | — | conf |
UMAP (Adjunct Publication)
|
| 2019 | A* | conf |
USENIX Security Symposium
|
| 2019 | — | conf |
ECIS
|
| 2019 | — | conf |
PDH
|
| 2019 | J | jnl |
Games
|
| 2019 | — | conf |
GameSec
|
| 2018 | — | conf |
APF
|
| 2018 | — | conf |
Financial Cryptography
|
| 2018 | J | jnl |
IEEE Access
|
| 2018 | — | conf |
ESORICS (1)
|
| 2018 | — | conf |
GameSec
|
| 2018 | — | conf |
iThings/GreenCom/CPSCom/SmartData
|
| 2018 | J | jnl |
CoRR
|
| 2018 | J | jnl |
ACM Trans. Internet Techn.
|
| 2018 | J | jnl |
CoRR
|
| 2018 | — | conf |
iThings/GreenCom/CPSCom/SmartData
|
| 2018 | J | jnl |
ACM Trans. Internet Techn.
|
| 2018 | A | conf |
ACSAC
|
| 2018 | — | conf |
Financial Cryptography
|
| 2018 | J | jnl |
EAI Endorsed Trans. Security Safety
|
| 2018 | A | conf |
RAID
|
| 2017 | — | conf |
eCrime
|
| 2017 | A* | conf |
USENIX Security Symposium
|
| 2017 | J | jnl |
CoRR
|
| 2017 | J | jnl |
CoRR
|
| 2017 | — | ed. |
Financial Cryptography
|
| 2017 | J | jnl |
J. Cybersecur.
|
| 2017 | A | conf |
ACSAC
|
| 2017 | — | conf |
GameSec
|
| 2017 | J | jnl |
CoRR
|
| 2017 | J | jnl |
CoRR
|
| 2017 | A | conf |
SOUPS
|
| 2017 | C | conf |
SecureComm
|
| 2017 | J | jnl |
CoRR
|
| 2016 | J | jnl |
CoRR
|
| 2016 | — | conf |
ESORICS (2)
|
| 2016 | — | conf |
GameSec
|
| 2016 | J | jnl |
CoRR
|
| 2016 | J | jnl |
Found. Trends Hum. Comput. Interact.
|
| 2016 | B | conf |
CANS
|
| 2016 | J | jnl |
Proc. Priv. Enhancing Technol.
|
| 2016 | — | conf |
eCrime
|
| 2015 | J | jnl |
CoRR
|
| 2015 | A | conf |
CSF
|
| 2015 | — | conf |
Financial Cryptography
|
| 2015 | J | jnl |
Trans. Data Hiding Multim. Secur.
|
| 2015 | A* | conf |
CCS
|
| 2015 | — | conf |
GameSec
|
| 2015 | — | conf |
ESORICS (1)
|
| 2015 | C | conf |
ICIS
|
| 2015 | — | conf |
Financial Cryptography Workshops
|
| 2014 | — | conf |
GameSec
|
| 2014 | — | conf |
SIW@CCS
|
| 2014 | — | conf |
ECIS
|
| 2014 | — | conf |
CSCW Companion
|
| 2014 | — | conf |
Financial Cryptography
|
| 2014 | — | conf |
Financial Cryptography Workshops
|
| 2014 | A | conf |
CSF
|
| 2014 | A | conf |
AsiaCCS
|
| 2014 | J | jnl |
ACM Trans. Internet Techn.
|
| 2014 | A | conf |
Privacy Enhancing Technologies
|
| 2014 | A | conf |
CSF
|
| 2013 | — | conf |
EUSIPCO
|
| 2013 | — | ch. |
The Economics of Information Security and Privacy
|
| 2013 | A | conf |
CSCW
|
| 2013 | C | conf |
IWDW
|
| 2013 | A | conf |
ESORICS
|
| 2013 | — | conf |
WINE
|
| 2013 | — | conf |
GameSec
|
| 2013 | — | conf |
WINE
|
| 2012 | — | conf |
WEIS
|
| 2012 | — | ed. |
GameSec
|
| 2012 | — | conf |
Financial Cryptography
|
| 2012 | C | conf |
ICIS
|
| 2012 | J | jnl |
Inf. Polity
|
| 2011 | — | conf |
Financial Cryptography
|
| 2011 | — | conf |
GAMENETS
|
| 2011 | — | conf |
GameSec
|
| 2011 | C | conf |
NSPW
|
| 2011 | — | conf |
DG.O
|
| 2010 | A | conf |
ESORICS
|
| 2010 | — | conf |
TRUST
|
| 2010 | Misc | conf |
SAC
|
| 2010 | — | conf |
GameSec
|
| 2010 | — | conf |
Financial Cryptography
|
| 2009 | — | conf |
Financial Cryptography
|
| 2009 | — | conf |
WEIS
|
| 2009 | — | conf |
GAMENETS
|
| 2008 | — | conf |
UPSEC
|
| 2008 | A* | conf |
WWW
|
| 2008 | — | conf |
WEIS
|
| 2008 | A* | conf |
EC
|
| 2007 | — | conf |
Financial Cryptography
|
| 2007 | — | conf |
Experimental Computer Science
|
| 2007 | A* | conf |
CHI
|
| 2007 | — | conf |
WEIS
|
| 2006 | J | jnl |
IEEE Trans. Syst. Man Cybern. Part C
|
| 2005 | J | jnl |
IEEE Secur. Priv.
|
| 2005 | A | conf |
SOUPS
|
| 2005 | — | conf |
WEIS
|
| 2004 | J | jnl |
CoRR
|
| 2004 | — | ch. |
Economics of Information Security
|
| 2003 | — | conf |
IAT
|
| 2003 | B | conf |
Mobile Data Management
|
| 2003 | J | jnl |
IEEE Distributed Syst. Online
|
| 2001 | A* | conf |
EC
|