| Year | Rank | Type | Title / Venue / Authors |
|---|---|---|---|
| 2018 | Misc | conf |
ACSSC
|
| 2018 | C | conf |
FUSION
|
| 2018 | Misc | conf |
ACSSC
|
| 2014 | J | jnl |
Autom.
|
| 2011 | J | jnl |
IEEE Trans. Autom. Control.
|
| 2008 | J | jnl |
Inf. Fusion
|
| 2007 | J | jnl |
IEEE Commun. Lett.
|
| 2006 | J | jnl |
Pattern Recognit.
|
| 2004 | — | conf |
CDC
|
| 2004 | C | conf |
ACC
|
| 2003 | — | conf |
Integrated Network Management
|
| 2002 | — | conf |
Control and estimation methods in information assurance - a tutorial on intrusion detection systems.
CDC
|
| 2002 | A | conf |
SDM
|
| 2002 | B | conf |
NOMS
|
| 2002 | — | conf |
CDC
|
| 2002 | A | conf |
RAID
|
| 2002 | J | jnl |
J. Netw. Syst. Manag.
|
| 2002 | — | ch. |
Applications of Data Mining in Computer Security
|
| 2002 | — | ch. |
Applications of Data Mining in Computer Security
|
| 2001 | J | jnl |
SIGMOD Rec.
|
| 2001 | — | conf |
Integrated Network Management
|
| 2000 | B | conf |
MASCOTS
|
| 1999 | J | jnl |
IEEE Trans. Autom. Control.
|
| 1992 | A* | conf |
ICRA
|