| Year | Rank | Type | Title / Venue / Authors |
|---|---|---|---|
| 2020 | J | jnl |
IEEE/ACM Trans. Netw.
|
| 2019 | J | jnl |
IEEE/ACM Trans. Netw.
|
| 2018 | A* | conf |
INFOCOM
|
| 2018 | J | jnl |
IEEE/ACM Trans. Netw.
|
| 2017 | A* | conf |
INFOCOM
|
| 2016 | J | jnl |
Int. J. Networked Distributed Comput.
|
| 2016 | — | conf |
MILCOM
|
| 2016 | — | conf |
MILCOM
|
| 2016 | Misc | conf |
CISS
|
| 2016 | — | conf |
MILCOM
|
| 2016 | — | conf |
MILCOM
|
| 2016 | A* | conf |
USENIX Security Symposium
|
| 2015 | — | conf |
MILCOM
|
| 2015 | — | conf |
To Be Proactive or Not: A Framework to Model Cyber Maneuvers for Critical Path Protection in MANETs.
MTD@CCS
|
| 2014 | A | conf |
SIGCSE
|
| 2014 | C | conf |
SNPD
|
| 2014 | — | conf |
MTD@CCS
|
| 2014 | A* | conf |
ASE
|
| 2012 | Misc | conf |
CISS
|
| 2011 | Misc | conf |
CISS
|
| 2011 | — | conf |
MILCOM
|
| 2009 | B | conf |
ARES
|
| 2009 | Misc | conf |
CISS
|
| 2008 | Misc | conf |
CISS
|
| 2008 | — | conf |
Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security
|
| 2008 | B | conf |
ICIP
|
| 2007 | Misc | conf |
CISS
|
| 2007 | — | conf |
ICIP (2)
|
| 2006 | — | conf |
Security, Steganography, and Watermarking of Multimedia Contents
|
| 2006 | Misc | conf |
CISS
|
| 2005 | — | conf |
SESS@ICSE
|
| 2005 | J | jnl |
ACM SIGSOFT Softw. Eng. Notes
|
| 2003 | A | conf |
ISSRE
|
| 2002 | — | conf |
HPCS
|
| 2000 | — | conf |
Security and Watermarking of Multimedia Contents
|
| 1999 | J | jnl |
IEEE Trans. Signal Process.
|
| 1999 | J | jnl |
IEEE Trans. Image Process.
|
| 1998 | — | conf |
ICIP (2)
|
| 1998 | — | conf |
Information Hiding
|
| 1996 | — | conf |
ICIP (3)
|