| Year | Rank | Type | Title / Venue / Authors |
|---|---|---|---|
| 2026 | J | jnl |
CoRR
|
| 2025 | J | jnl |
ACM Comput. Surv.
|
| 2024 | — | conf |
IFIP Int. Conf. Digital Forensics
|
| 2024 | — | conf |
IFIP Int. Conf. Digital Forensics
|
| 2024 | J | jnl |
Digit. Investig.
|
| 2024 | — | conf |
ICDF2C (1)
|
| 2024 | C | conf |
ICIS
|
| 2023 | — | conf |
IFIP Int. Conf. Digital Forensics
|
| 2023 | J | jnl |
Forensic Sci. Int. Digit. Investig.
|
| 2023 | J | jnl |
ACM Trans. Multim. Comput. Commun. Appl.
|
| 2023 | A* | conf |
AAAI
|
| 2023 | — | conf |
UbiSec
|
| 2023 | — | conf |
IFIP Int. Conf. Digital Forensics
|
| 2022 | — | conf |
IFIP Int. Conf. Digital Forensics
|
| 2022 | — | conf |
IFIP Int. Conf. Digital Forensics
|
| 2022 | J | jnl |
CoRR
|
| 2022 | J | jnl |
CoRR
|
| 2022 | J | jnl |
Digit. Investig.
|
| 2022 | J | jnl |
Digit. Investig.
|
| 2021 | J | jnl |
Digit. Investig.
|
| 2021 | J | jnl |
Digit. Investig.
|
| 2021 | — | conf |
Critical Infrastructure Protection
|
| 2021 | — | conf |
IFIP Int. Conf. Digital Forensics
|
| 2021 | J | jnl |
Digit. Investig.
|
| 2021 | — | conf |
IFIP Int. Conf. Digital Forensics
|
| 2021 | — | conf |
Critical Infrastructure Protection
|
| 2021 | — | conf |
CSE
|
| 2020 | J | jnl |
IEEE Access
|
| 2020 | — | conf |
IFIP Int. Conf. Digital Forensics
|
| 2020 | — | conf |
IFIP Int. Conf. Digital Forensics
|
| 2020 | — | conf |
Critical Infrastructure Protection
|
| 2020 | — | conf |
IFIP Int. Conf. Digital Forensics
|
| 2020 | — | conf |
IFIP Int. Conf. Digital Forensics
|
| 2020 | — | conf |
SADFE
|
| 2019 | — | conf |
Critical Infrastructure Protection
|
| 2019 | C | conf |
ISI
|
| 2019 | — | conf |
Critical Infrastructure Protection
|
| 2019 | — | conf |
IFIP Int. Conf. Digital Forensics
|
| 2018 | — | conf |
IFIP Int. Conf. Digital Forensics
|
| 2018 | J | jnl |
Int. J. Digit. Crime Forensics
|
| 2018 | — | conf |
IFIP Int. Conf. Digital Forensics
|
| 2018 | — | conf |
IEEE Symposium on Security and Privacy Workshops
|
| 2018 | J | jnl |
Int. J. Digit. Crime Forensics
|
| 2018 | — | conf |
IFIP Int. Conf. Digital Forensics
|
| 2018 | J | jnl |
Secur. Priv.
|
| 2017 | — | conf |
IFIP Int. Conf. Digital Forensics
|
| 2017 | — | conf |
CNS
|
| 2017 | C | conf |
ISI
|
| 2017 | — | conf |
Critical Infrastructure Protection
|
| 2017 | — | ch. |
Mobile Security and Privacy
|
| 2016 | — | conf |
Critical Infrastructure Protection
|
| 2016 | — | conf |
ACISP (2)
|
| 2016 | — | conf |
IFIP Int. Conf. Digital Forensics
|
| 2016 | J | jnl |
Digit. Investig.
|
| 2016 | — | conf |
IFIP Int. Conf. Digital Forensics
|
| 2015 | — | conf |
IFIP Int. Conf. Digital Forensics
|
| 2015 | — | conf |
IFIP Int. Conf. Digital Forensics
|
| 2015 | — | conf |
Critical Infrastructure Protection
|
| 2015 | — | conf |
IFIP Int. Conf. Digital Forensics
|
| 2015 | — | conf |
HLT-NAACL
|
| 2015 | J | jnl |
J. Digit. Forensics Secur. Law
|
| 2015 | — | conf |
IFIP Int. Conf. Digital Forensics
|
| 2015 | J | jnl |
J. Digit. Forensics Secur. Law
|
| 2014 | — | conf |
ACL (2)
|
| 2014 | — | conf |
SFCS@ASIACCS
|
| 2014 | — | conf |
IFIP Int. Conf. Digital Forensics
|
| 2014 | Misc | conf |
SEC
|
| 2014 | A | conf |
ECAI
|
| 2014 | J | jnl |
Peer-to-Peer Netw. Appl.
|
| 2014 | J | jnl |
J. Digit. Forensics Secur. Law
|
| 2014 | — | conf |
IFIP Int. Conf. Digital Forensics
|
| 2014 | — | conf |
IFIP Int. Conf. Digital Forensics
|
| 2013 | — | conf |
IFIP Int. Conf. Digital Forensics
|
| 2013 | — | conf |
ITQM
|
| 2013 | — | conf |
IFIP Int. Conf. Digital Forensics
|
| 2013 | J | jnl |
IEEE Trans. Inf. Forensics Secur.
|
| 2013 | — | conf |
WASA
|
| 2013 | — | conf |
SADFE
|
| 2013 | — | conf |
SADFE
|
| 2013 | — | conf |
COMPSAC Workshops
|
| 2013 | J | jnl |
Inf. Process. Manag.
|
| 2012 | — | conf |
IFIP Int. Conf. Digital Forensics
|
| 2012 | — | conf |
IFIP Int. Conf. Digital Forensics
|
| 2012 | — | conf |
IFIP Int. Conf. Digital Forensics
|
| 2011 | — | conf |
SADFE
|
| 2011 | — | conf |
IIH-MSP
|
| 2011 | — | conf |
IIH-MSP
|
| 2011 | — | conf |
IIH-MSP
|
| 2011 | — | conf |
SADFE
|
| 2011 | — | conf |
IFIP Int. Conf. Digital Forensics
|
| 2011 | — | conf |
IIH-MSP
|
| 2011 | J | jnl |
J. Zhejiang Univ. Sci. C
|
| 2010 | B | conf |
ARES
|
| 2010 | — | ed. |
IFIP Int. Conf. Digital Forensics
|
| 2010 | — | conf |
IFIP Int. Conf. Digital Forensics
|
| 2010 | — | conf |
IFIP Int. Conf. Digital Forensics
|
| 2010 | — | conf |
IFIP Int. Conf. Digital Forensics
|
| 2010 | — | ch. |
Handbook of Research on Computational Forensics, Digital Crime, and Investigation
|
| 2010 | — | conf |
IFIP Int. Conf. Digital Forensics
|
| 2010 | — | conf |
IFIP Int. Conf. Digital Forensics
|
| 2010 | J | jnl |
IEICE Trans. Fundam. Electron. Commun. Comput. Sci.
|
| 2010 | — | conf |
GreenCom/CPSCom
|
| 2009 | — | conf |
IFIP Int. Conf. Digital Forensics
|
| 2009 | — | conf |
ICDF2C
|
| 2009 | — | conf |
IFIP Int. Conf. Digital Forensics
|
| 2009 | — | conf |
IFIP Int. Conf. Digital Forensics
|
| 2009 | — | conf |
ICIMCS
|
| 2009 | B | conf |
ICPADS
|
| 2009 | Misc | conf |
ICIG
|
| 2008 | — | conf |
SADFE
|
| 2008 | — | conf |
IFIP Int. Conf. Digital Forensics
|
| 2007 | — | conf |
MCAM
|
| 2007 | J | jnl |
Int. J. Netw. Secur.
|
| 2007 | — | conf |
FGCN (2)
|
| 2007 | — | conf |
FGCN (2)
|
| 2007 | — | conf |
ICIAR
|
| 2007 | — | conf |
SADFE
|
| 2007 | C | conf |
ISPEC
|
| 2007 | — | conf |
SIP
|
| 2006 | — | conf |
Security and Management
|
| 2006 | J | jnl |
IEEE J. Sel. Areas Commun.
|
| 2006 | J | jnl |
Comput. Commun.
|
| 2006 | — | conf |
ISDA (2)
|
| 2005 | J | jnl |
J. Syst. Softw.
|
| 2005 | — | conf |
ICCSA (3)
|
| 2005 | B | conf |
WCNC
|
| 2005 | — | conf |
SADFE
|
| 2005 | — | conf |
Security and Management
|
| 2005 | Misc | conf |
MVA
|
| 2005 | J | jnl |
Appl. Math. Comput.
|
| 2005 | — | conf |
ICPADS (2)
|
| 2005 | Misc | conf |
ACISP
|
| 2004 | — | conf |
IASTED Conf. on Software Engineering
|
| 2004 | — | conf |
ISPAN
|
| 2004 | B | conf |
COMPSAC
|
| 2004 | C | conf |
ICICS
|
| 2004 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2004 | — | conf |
ACSC
|
| 2004 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2003 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2003 | Misc | conf |
ICISC
|
| 2001 | J | jnl |
Inf. Process. Lett.
|
| 2000 | — | conf |
Public Key Cryptography
|
| 2000 | J | jnl |
Inf. Process. Lett.
|
| 1997 | B | conf |
PACT
|
| 1996 | C | conf |
APSEC
|