| Year | Rank | Type | Title / Venue / Authors |
|---|---|---|---|
| 2026 | J | jnl |
IEEE Trans. Inf. Forensics Secur.
|
| 2026 | J | jnl |
ACM Trans. Priv. Secur.
|
| 2026 | J | jnl |
Comput. Ind. Eng.
|
| 2026 | J | jnl |
IEEE Open J. Comput. Soc.
|
| 2025 | J | jnl |
IEEE Open J. Comput. Soc.
|
| 2025 | J | jnl |
IEEE Open J. Comput. Soc.
|
| 2025 | J | jnl |
IEEE Trans. Dependable Secur. Comput.
|
| 2025 | J | jnl |
Appl. Soft Comput.
|
| 2025 | J | jnl |
Symmetry
|
| 2025 | J | jnl |
IEEE Trans. Dependable Secur. Comput.
|
| 2025 | J | jnl |
IEEE Open J. Comput. Soc.
|
| 2025 | J | jnl |
IET Cyper-Phys. Syst.: Theory & Appl.
|
| 2025 | J | jnl |
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol.
|
| 2025 | J | jnl |
IEEE Trans. Dependable Secur. Comput.
|
| 2025 | J | jnl |
IEEE Open J. Comput. Soc.
|
| 2025 | J | jnl |
IEEE Trans. Inf. Forensics Secur.
|
| 2025 | J | jnl |
IEEE Open J. Comput. Soc.
|
| 2025 | J | jnl |
IEEE Trans. Sustain. Comput.
|
| 2024 | J | jnl |
IEEE Open J. Comput. Soc.
|
| 2024 | J | jnl |
IEEE Trans. Inf. Forensics Secur.
|
| 2024 | J | jnl |
CoRR
|
| 2024 | J | jnl |
IEEE Trans. Inf. Forensics Secur.
|
| 2024 | J | jnl |
IEEE Trans. Dependable Secur. Comput.
|
| 2024 | J | jnl |
IEEE Trans. Inf. Forensics Secur.
|
| 2024 | C | conf |
PST
|
| 2024 | J | jnl |
CAAI Trans. Intell. Technol.
|
| 2024 | J | jnl |
IEEE Trans. Emerg. Top. Comput. Intell.
|
| 2024 | J | jnl |
IEEE Open J. Comput. Soc.
|
| 2024 | J | jnl |
IEEE Trans. Inf. Forensics Secur.
|
| 2024 | — | conf |
ProvSec (2)
|
| 2024 | J | jnl |
IEEE Trans. Inf. Forensics Secur.
|
| 2024 | J | jnl |
IEEE Trans. Inf. Forensics Secur.
|
| 2024 | J | jnl |
IEEE Trans. Inf. Forensics Secur.
|
| 2024 | J | jnl |
Sensors
|
| 2024 | — | conf |
CAI
|
| 2024 | J | jnl |
IEEE Trans. Image Process.
|
| 2023 | J | jnl |
IEEE Internet Things J.
|
| 2023 | J | jnl |
IEEE Trans. Dependable Secur. Comput.
|
| 2023 | J | jnl |
CoRR
|
| 2023 | J | jnl |
IEEE Trans. Inf. Forensics Secur.
|
| 2023 | J | jnl |
IEEE Internet Things J.
|
| 2023 | J | jnl |
Sensors
|
| 2023 | — | conf |
SmartGridComm
|
| 2023 | J | jnl |
IEEE Trans. Dependable Secur. Comput.
|
| 2023 | J | jnl |
IEEE Trans. Pattern Anal. Mach. Intell.
|
| 2023 | J | jnl |
CoRR
|
| 2023 | — | conf |
WHISPERS
|
| 2023 | J | jnl |
IEEE Trans. Cybern.
|
| 2023 | J | jnl |
IEEE Trans. Dependable Secur. Comput.
|
| 2023 | J | jnl |
IEEE Internet Things J.
|
| 2023 | J | jnl |
IEEE Trans. Dependable Secur. Comput.
|
| 2023 | J | jnl |
IEEE Trans. Inf. Forensics Secur.
|
| 2022 | J | jnl |
ACM Comput. Surv.
|
| 2022 | J | jnl |
CoRR
|
| 2022 | J | jnl |
IEEE Open J. Comput. Soc.
|
| 2022 | J | jnl |
IEEE Open J. Comput. Soc.
|
| 2022 | J | jnl |
IEEE Trans. Ind. Informatics
|
| 2022 | J | jnl |
Sensors
|
| 2022 | J | jnl |
IEEE Internet Things J.
|
| 2022 | J | jnl |
IEEE Internet Things J.
|
| 2022 | J | jnl |
CoRR
|
| 2022 | J | jnl |
IEEE Trans. Inf. Forensics Secur.
|
| 2022 | J | jnl |
Concurr. Comput. Pract. Exp.
|
| 2022 | J | jnl |
CoRR
|
| 2022 | C | conf |
IGARSS
|
| 2022 | J | jnl |
IEEE Trans. Pattern Anal. Mach. Intell.
|
| 2022 | J | jnl |
Int. J. Multim. Intell. Secur.
|
| 2022 | J | jnl |
CoRR
|
| 2022 | J | jnl |
IEEE Open J. Comput. Soc.
|
| 2022 | J | jnl |
CoRR
|
| 2022 | J | jnl |
Future Gener. Comput. Syst.
|
| 2022 | J | jnl |
IEEE Trans. Cloud Comput.
|
| 2022 | J | jnl |
J. Netw. Comput. Appl.
|
| 2022 | J | jnl |
Sensors
|
| 2022 | J | jnl |
IEEE Trans. Geosci. Remote. Sens.
|
| 2022 | J | jnl |
J. Comput. Methods Sci. Eng.
|
| 2022 | J | jnl |
J. Vis. Commun. Image Represent.
|
| 2022 | J | jnl |
IEEE Internet Things J.
|
| 2022 | J | jnl |
IEEE Trans. Dependable Secur. Comput.
|
| 2022 | A | conf |
INTERSPEECH
|
| 2022 | J | jnl |
CoRR
|
| 2022 | A* | conf |
MobiCom
|
| 2022 | J | jnl |
IEEE Trans. Geosci. Remote. Sens.
|
| 2022 | J | jnl |
IEEE Geosci. Remote. Sens. Lett.
|
| 2021 | J | jnl |
IEEE Trans. Pattern Anal. Mach. Intell.
|
| 2021 | J | jnl |
IEEE Trans. Inf. Forensics Secur.
|
| 2021 | J | jnl |
A Survey on 2D and 3D Contactless Fingerprint Biometrics: A Taxonomy, Review, and Future Directions.
IEEE Open J. Comput. Soc.
|
| 2021 | J | jnl |
IEEE Open J. Comput. Soc.
|
| 2021 | J | jnl |
IEEE Trans. Sustain. Comput.
|
| 2021 | J | jnl |
IEEE Open J. Comput. Soc.
|
| 2021 | J | jnl |
IEEE Signal Process. Lett.
|
| 2021 | — | conf |
SLT
|
| 2021 | J | jnl |
IEEE Trans. Cloud Comput.
|
| 2021 | J | jnl |
IEEE Internet Things J.
|
| 2021 | J | jnl |
IEEE Trans. Inf. Forensics Secur.
|
| 2021 | J | jnl |
IEEE Trans. Big Data
|
| 2021 | J | jnl |
Ad Hoc Networks
|
| 2021 | J | jnl |
Ad Hoc Networks
|
| 2021 | J | jnl |
IEEE Trans. Inf. Forensics Secur.
|
| 2021 | J | jnl |
J. Netw. Comput. Appl.
|
| 2021 | J | jnl |
IEEE Trans. Cogn. Dev. Syst.
|
| 2021 | J | jnl |
J. Netw. Comput. Appl.
|
| 2021 | J | jnl |
IEEE Trans. Inf. Forensics Secur.
|
| 2021 | J | jnl |
IEEE Trans. Cloud Comput.
|
| 2021 | C | conf |
IGARSS
|
| 2020 | J | jnl |
Adapt. Behav.
|
| 2020 | J | jnl |
Pattern Recognit.
|
| 2020 | J | jnl |
IEEE Trans. Inf. Forensics Secur.
|
| 2020 | J | jnl |
Future Gener. Comput. Syst.
|
| 2020 | J | jnl |
CoRR
|
| 2020 | J | jnl |
CoRR
|
| 2020 | J | jnl |
IEEE Trans. Geosci. Remote. Sens.
|
| 2020 | J | jnl |
IEEE Access
|
| 2020 | J | jnl |
IEEE Trans. Geosci. Remote. Sens.
|
| 2020 | J | jnl |
J. Parallel Distributed Comput.
|
| 2020 | J | jnl |
Future Gener. Comput. Syst.
|
| 2020 | Misc | conf |
DICTA
|
| 2019 | J | jnl |
Sensors
|
| 2019 | J | jnl |
J. Netw. Comput. Appl.
|
| 2019 | J | jnl |
IEEE Geosci. Remote. Sens. Lett.
|
| 2019 | J | jnl |
IEEE Trans. Inf. Forensics Secur.
|
| 2019 | J | jnl |
J. Netw. Comput. Appl.
|
| 2019 | J | jnl |
IEEE Trans. Big Data
|
| 2019 | J | jnl |
IEEE Trans. Inf. Forensics Secur.
|
| 2019 | J | jnl |
CoRR
|
| 2019 | — | conf |
WHISPERS
|
| 2019 | J | jnl |
Remote. Sens.
|
| 2019 | J | jnl |
Remote. Sens.
|
| 2019 | J | jnl |
CoRR
|
| 2019 | J | jnl |
J. Parallel Distributed Comput.
|
| 2019 | J | jnl |
J. Netw. Comput. Appl.
|
| 2019 | J | jnl |
IEEE Trans. Ind. Informatics
|
| 2019 | J | jnl |
Symmetry
|
| 2019 | J | jnl |
Aust. J. Intell. Inf. Process. Syst.
|
| 2018 | J | jnl |
IEEE Access
|
| 2018 | J | jnl |
Pattern Recognit.
|
| 2018 | J | jnl |
J. Netw. Comput. Appl.
|
| 2018 | J | jnl |
Future Gener. Comput. Syst.
|
| 2018 | J | jnl |
Comput. Intell.
|
| 2018 | B | conf |
GLOBECOM
|
| 2018 | C | conf |
IGARSS
|
| 2018 | J | jnl |
Wirel. Commun. Mob. Comput.
|
| 2018 | J | jnl |
CoRR
|
| 2018 | J | jnl |
IEEE Trans. Inf. Forensics Secur.
|
| 2018 | J | jnl |
Secur. Commun. Networks
|
| 2018 | J | jnl |
CoRR
|
| 2018 | J | jnl |
IEEE Trans. Emerg. Top. Comput. Intell.
|
| 2018 | J | jnl |
Frontiers Neurorobotics
|
| 2018 | J | jnl |
CoRR
|
| 2018 | — | ed. |
MONAMI
|
| 2018 | B | conf |
FUZZ-IEEE
|
| 2018 | Misc | conf |
DICTA
|
| 2018 | B | conf |
GLOBECOM
|
| 2018 | J | jnl |
IEEE Access
|
| 2018 | C | conf |
IGARSS
|
| 2017 | — | conf |
MONAMI
|
| 2017 | — | conf |
MONAMI
|
| 2017 | J | jnl |
Knowl. Based Syst.
|
| 2017 | J | jnl |
Pattern Recognit.
|
| 2017 | — | conf |
MONAMI
|
| 2017 | — | conf |
MONAMI
|
| 2017 | J | jnl |
Secur. Commun. Networks
|
| 2017 | J | jnl |
Int. J. Found. Comput. Sci.
|
| 2017 | J | jnl |
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol.
|
| 2017 | J | jnl |
Pattern Recognit.
|
| 2017 | — | conf |
MONAMI
|
| 2017 | J | jnl |
IEEE Trans. Inf. Forensics Secur.
|
| 2017 | C | conf |
IGARSS
|
| 2017 | J | jnl |
CoRR
|
| 2017 | J | jnl |
J. Netw. Comput. Appl.
|
| 2017 | J | jnl |
IEEE Trans. Inf. Forensics Secur.
|
| 2017 | J | jnl |
Int. J. Auton. Adapt. Commun. Syst.
|
| 2017 | — | conf |
WIFS
|
| 2017 | Misc | conf |
DICTA
|
| 2017 | J | jnl |
Clust. Comput.
|
| 2017 | J | jnl |
Future Gener. Comput. Syst.
|
| 2017 | J | jnl |
Pers. Ubiquitous Comput.
|
| 2017 | — | conf |
MONAMI
|
| 2017 | — | conf |
MONAMI
|
| 2017 | J | jnl |
Soft Comput.
|
| 2017 | — | ed. |
SSCC
|
| 2017 | C | conf |
IECON
|
| 2016 | J | jnl |
IEEE Trans. Computers
|
| 2016 | J | jnl |
IEEE Trans. Inf. Forensics Secur.
|
| 2016 | J | jnl |
A Survey of Game Theoretic Approaches to Modelling Decision-Making in Information Warfare Scenarios.
Future Internet
|
| 2016 | J | jnl |
Pattern Recognit.
|
| 2016 | J | jnl |
J. Netw. Comput. Appl.
|
| 2016 | J | jnl |
IEEE Trans. Parallel Distributed Syst.
|
| 2016 | J | jnl |
Future Gener. Comput. Syst.
|
| 2016 | — | conf |
ICIT
|
| 2016 | C | conf |
PST
|
| 2016 | — | conf |
BICS
|
| 2016 | Misc | conf |
TRIDENTCOM
|
| 2016 | J | jnl |
Wirel. Commun. Mob. Comput.
|
| 2016 | J | jnl |
IEEE Trans. Smart Grid
|
| 2016 | J | jnl |
ACM Trans. Embed. Comput. Syst.
|
| 2016 | — | conf |
ACISP (2)
|
| 2016 | J | jnl |
IEEE Trans. Ind. Informatics
|
| 2016 | J | jnl |
Concurr. Comput. Pract. Exp.
|
| 2016 | J | jnl |
Simul. Model. Pract. Theory
|
| 2016 | J | jnl |
IEEE Cloud Comput.
|
| 2016 | J | jnl |
Future Gener. Comput. Syst.
|
| 2016 | J | jnl |
Secur. Commun. Networks
|
| 2016 | J | jnl |
Secur. Commun. Networks
|
| 2016 | — | conf |
Using game theory with intrinsic motivation to examine anti-hacking policies for autonomous systems.
SSCI
|
| 2016 | C | conf |
PST
|
| 2016 | J | jnl |
Future Internet
|
| 2015 | J | jnl |
IEEE Cloud Comput.
|
| 2015 | J | jnl |
IEEE J. Biomed. Health Informatics
|
| 2015 | J | jnl |
IEEE Trans. Inf. Forensics Secur.
|
| 2015 | J | jnl |
EAI Endorsed Trans. Ind. Networks Intell. Syst.
|
| 2015 | — | conf |
ICIT
|
| 2015 | J | jnl |
Sensors
|
| 2015 | J | jnl |
Pattern Recognit. Lett.
|
| 2015 | J | jnl |
Int. J. Distributed Sens. Networks
|
| 2015 | J | jnl |
IEEE Trans. Computers
|
| 2015 | J | jnl |
IEEE Trans. Computers
|
| 2015 | J | jnl |
IEEE Trans. Computers
|
| 2015 | — | conf |
CSCloud
|
| 2015 | B | conf |
NSS
|
| 2015 | C | conf |
ISADS
|
| 2015 | J | jnl |
J. Netw. Comput. Appl.
|
| 2015 | J | jnl |
Int. J. Distributed Sens. Networks
|
| 2015 | J | jnl |
IEEE Trans. Parallel Distributed Syst.
|
| 2015 | J | jnl |
IEEE Trans. Geosci. Remote. Sens.
|
| 2015 | — | conf |
CSCloud
|
| 2014 | J | jnl |
IEEE Trans. Inf. Forensics Secur.
|
| 2014 | J | jnl |
CoRR
|
| 2014 | J | jnl |
CoRR
|
| 2014 | J | jnl |
IEEE Trans. Computers
|
| 2014 | — | conf |
FSKD
|
| 2014 | J | jnl |
Future Gener. Comput. Syst.
|
| 2014 | — | conf |
INFOCOM Workshops
|
| 2014 | J | jnl |
J. Netw. Comput. Appl.
|
| 2014 | — | conf |
FSKD
|
| 2014 | — | conf |
FSKD
|
| 2014 | J | jnl |
Pattern Recognit.
|
| 2014 | J | jnl |
Concurr. Comput. Pract. Exp.
|
| 2014 | J | jnl |
Pattern Recognit.
|
| 2014 | J | jnl |
IEEE Cloud Comput.
|
| 2014 | B | conf |
NSS
|
| 2014 | — | conf |
FSKD
|
| 2014 | B | conf |
NSS
|
| 2014 | J | jnl |
Wirel. Commun. Mob. Comput.
|
| 2014 | — | conf |
FSKD
|
| 2014 | J | jnl |
IEEE Trans. Parallel Distributed Syst.
|
| 2014 | J | jnl |
J. Netw. Comput. Appl.
|
| 2014 | J | jnl |
IEEE Trans. Parallel Distributed Syst.
|
| 2014 | — | conf |
FSKD
|
| 2013 | B | conf |
NSS
|
| 2013 | J | jnl |
A Forward-Backward Algorithm for Nested Hidden semi-Markov Model and Application to Network Traffic.
Comput. J.
|
| 2013 | C | conf |
CIS
|
| 2013 | Misc | conf |
ICNC
|
| 2013 | J | jnl |
IEEE Trans. Parallel Distributed Syst.
|
| 2013 | J | jnl |
Wirel. Commun. Mob. Comput.
|
| 2013 | — | conf |
CSS
|
| 2013 | B | conf |
WCNC
|
| 2013 | B | conf |
WCNC
|
| 2013 | J | jnl |
Telecommun. Syst.
|
| 2013 | J | jnl |
IEEE Trans. Parallel Distributed Syst.
|
| 2013 | B | conf |
NSS
|
| 2013 | J | jnl |
IEEE Trans. Parallel Distributed Syst.
|
| 2013 | J | jnl |
IEEE Trans. Parallel Distributed Syst.
|
| 2012 | B | conf |
TrustCom
|
| 2012 | — | conf |
CSS
|
| 2012 | — | conf |
CSS
|
| 2012 | J | jnl |
IEEE Trans. Ind. Informatics
|
| 2012 | B | conf |
TrustCom
|
| 2012 | J | jnl |
J. Netw. Comput. Appl.
|
| 2012 | J | jnl |
Comput. J.
|
| 2012 | J | jnl |
Concurr. Comput. Pract. Exp.
|
| 2012 | J | jnl |
Pattern Recognit.
|
| 2012 | J | jnl |
Comput. J.
|
| 2012 | J | jnl |
Comput. J.
|
| 2012 | J | jnl |
J. Netw. Comput. Appl.
|
| 2012 | B | conf |
TrustCom
|
| 2012 | — | conf |
ICIC (1)
|
| 2012 | B | conf |
TrustCom
|
| 2012 | J | jnl |
Concurr. Comput. Pract. Exp.
|
| 2012 | B | conf |
TrustCom
|
| 2012 | J | jnl |
Future Gener. Comput. Syst.
|
| 2012 | J | jnl |
J. Netw. Comput. Appl.
|
| 2011 | B | ed. |
NSS
|
| 2011 | C | conf |
DASC
|
| 2011 | J | jnl |
Secur. Commun. Networks
|
| 2011 | J | jnl |
Secur. Commun. Networks
|
| 2011 | J | jnl |
J. Netw. Comput. Appl.
|
| 2011 | J | jnl |
J. Netw. Comput. Appl.
|
| 2011 | J | jnl |
Comput. Secur.
|
| 2011 | J | jnl |
Secur. Commun. Networks
|
| 2011 | J | jnl |
Secur. Commun. Networks
|
| 2011 | J | jnl |
Comput. J.
|
| 2011 | J | jnl |
Comput. Secur.
|
| 2011 | B | conf |
NSS
|
| 2011 | J | jnl |
IEEE Trans. Pattern Anal. Mach. Intell.
|
| 2011 | — | conf |
MobiHealth
|
| 2011 | J | jnl |
Pattern Recognit.
|
| 2011 | J | jnl |
J. Netw. Comput. Appl.
|
| 2011 | J | jnl |
Comput. J.
|
| 2011 | J | jnl |
Int. J. Digit. Multim. Broadcast.
|
| 2010 | J | jnl |
Comput. Stand. Interfaces
|
| 2010 | C | conf |
ICARCV
|
| 2010 | — | conf |
ICC
|
| 2010 | — | ch. |
Handbook of Information and Communication Security
|
| 2010 | J | jnl |
J. Netw. Comput. Appl.
|
| 2010 | — | ch. |
Handbook of Information and Communication Security
|
| 2010 | B | ed. |
NSS
|
| 2010 | C | conf |
ICARCV
|
| 2010 | — | ch. |
Handbook of Information and Communication Security
|
| 2010 | — | ch. |
Handbook of Information and Communication Security
|
| 2010 | — | ch. |
Handbook of Information and Communication Security
|
| 2010 | B | conf |
NCA
|
| 2009 | J | jnl |
J. Netw. Comput. Appl.
|
| 2009 | J | jnl |
J. Netw. Comput. Appl.
|
| 2009 | J | jnl |
IEEE Netw.
|
| 2009 | B | conf |
NSS
|
| 2009 | — | conf |
ICC
|
| 2009 | B | conf |
NSS
|
| 2008 | — | conf |
ICC
|
| 2008 | J | jnl |
Secur. Commun. Networks
|
| 2007 | J | jnl |
IEEE Trans. Pattern Anal. Mach. Intell.
|
| 2007 | J | jnl |
Appl. Math. Comput.
|
| 2007 | — | conf |
ICC
|
| 2007 | J | jnl |
Appl. Math. Comput.
|
| 2007 | — | conf |
ICC
|
| 2007 | — | conf |
AutoID
|
| 2007 | J | jnl |
IEEE Trans. Circuits Syst. II Express Briefs
|
| 2007 | — | conf |
OTM Workshops (2)
|
| 2006 | — | conf |
ICIC (3)
|
| 2006 | — | conf |
ICB
|
| 2006 | C | conf |
IPCCC
|
| 2006 | B | conf |
GLOBECOM
|
| 2005 | Misc | conf |
DICTA
|
| 2005 | B | conf |
LCN
|
| 2005 | B | conf |
LCN
|
| 2004 | — | conf |
ICETE (3)
|
| 2004 | — | conf |
ICON
|
| 2004 | — | conf |
ICON
|
| 2004 | — | ed. |
WSMAI
|
| 2003 | — | conf |
ICON
|
| 2003 | — | conf |
ICON
|
| 2003 | — | conf |
ICEIS (3)
|
| 2003 | — | conf |
ICEIS (4)
|
| 2003 | — | ed. |
WSMAI
|
| 2001 | Misc | conf |
ICASSP
|
| 1999 | — | conf |
ISSPA
|