| Year | Rank | Type | Title / Venue / Authors |
|---|---|---|---|
| 2025 | — | conf |
DIMVA (2)
|
| 2025 | J | jnl |
CoRR
|
| 2025 | A | conf |
RAID
|
| 2025 | J | jnl |
CoRR
|
| 2025 | J | jnl |
CoRR
|
| 2025 | — | conf |
ARES (1)
|
| 2022 | J | jnl |
CoRR
|
| 2021 | B | conf |
ESANN
|
| 2021 | J | jnl |
IEEE Trans. Netw. Serv. Manag.
|
| 2021 | J | jnl |
CoRR
|
| 2020 | B | conf |
IDA
|
| 2019 | J | jnl |
Comput. Commun.
|
| 2019 | J | jnl |
CoRR
|
| 2018 | — | conf |
AINTEC
|
| 2017 | J | jnl |
CoRR
|
| 2017 | — | conf |
TMA
|
| 2016 | — | conf |
TMA
|
| 2015 | A* | conf |
INFOCOM
|
| 2015 | J | jnl |
Hunting attacks in the dark: clustering and correlation analysis for unsupervised anomaly detection.
Int. J. Netw. Manag.
|
| 2015 | Misc | conf |
ICASSP
|
| 2014 | B | conf |
IWCMC
|
| 2014 | B | conf |
IWCMC
|
| 2014 | — | conf |
INFOCOM Workshops
|
| 2014 | Misc | conf |
SAC
|
| 2012 | — | conf |
AINTEC
|
| 2012 | J | jnl |
IEEE Netw.
|
| 2012 | J | jnl |
Comput. Commun.
|
| 2011 | A | conf |
ITC
|
| 2011 | B | conf |
IWCMC
|
| 2011 | — | conf |
NTMS
|
| 2011 | — | conf |
TMA
|
| 2011 | B | conf |
CNSM
|
| 2011 | B | conf |
Networking (1)
|
| 2011 | — | — |
|
| 2010 | — | conf |
WWIC
|