| Year | Rank | Type | Title / Venue / Authors |
|---|---|---|---|
| 2025 | J | jnl |
ACM Trans. Comput. Hum. Interact.
|
| 2025 | — | conf |
Information Security in a Connected World
|
| 2025 | A* | conf |
CHI
|
| 2025 | J | jnl |
CoRR
|
| 2024 | J | jnl |
J. Cybersecur.
|
| 2024 | J | jnl |
Inf. Comput. Secur.
|
| 2023 | J | jnl |
CoRR
|
| 2022 | J | jnl |
SN Comput. Sci.
|
| 2022 | C | conf |
NSPW
|
| 2022 | A* | conf |
CHI
|
| 2022 | J | jnl |
Proc. ACM Hum. Comput. Interact.
|
| 2020 | A* | conf |
CHI
|
| 2020 | A* | conf |
CHI
|
| 2020 | — | conf |
WebSci (Companion)
|
| 2020 | J | jnl |
Proc. ACM Hum. Comput. Interact.
|
| 2020 | J | jnl |
Found. Trends Web Sci.
|
| 2020 | A* | conf |
CHI
|
| 2020 | A* | conf |
CHI
|
| 2019 | A* | conf |
CHI
|
| 2019 | J | jnl |
Interactions
|
| 2019 | A* | conf |
Relations are more than Bytes: Re-thinking the Benefits of Smart Services through People and Things.
CHI
|
| 2019 | J | jnl |
Trans. Edutainment
|
| 2019 | J | jnl |
Comput. Secur.
|
| 2018 | A* | conf |
CHI
|
| 2017 | — | conf |
HCI (22)
|
| 2016 | J | jnl |
Comput. Law Secur. Rev.
|
| 2015 | J | jnl |
J. Cybersecur.
|
| 2015 | C | conf |
NSPW
|
| 2015 | — | conf |
HCI (22)
|
| 2014 | — | conf |
UKAIS
|
| 2014 | C | conf |
NSPW
|
| 2014 | — | conf |
CHI Extended Abstracts
|
| 2013 | — | conf |
CHI Extended Abstracts
|
| 2013 | — | conf |
TRUST
|
| 2013 | — | conf |
CHI Extended Abstracts
|
| 2013 | — | ed. |
TRUST
|
| 2012 | — | conf |
STAST
|
| 2012 | Misc | conf |
SEC
|
| 2012 | J | jnl |
Dagstuhl Reports
|
| 2011 | B | conf |
TrustCom
|
| 2011 | J | jnl |
Inf. Secur. Tech. Rep.
|
| 2011 | — | conf |
SocialCom/PASSAT
|
| 2011 | C | conf |
NSPW
|
| 2011 | — | conf |
CSEDU (2)
|
| 2011 | — | conf |
SLPAT
|
| 2010 | — | conf |
Insider Threats: Strategies for Prevention, Mitigation, and Response
|
| 2010 | — | conf |
Insider Threats: Strategies for Prevention, Mitigation, and Response
|
| 2010 | — | ch. |
Insider Threats in Cyber Security
|
| 2010 | — | ed. |
Insider Threats: Strategies for Prevention, Mitigation, and Response
|
| 2010 | C | conf |
NSPW
|
| 2010 | — | conf |
EST
|
| 2010 | — | conf |
NordSec
|
| 2009 | J | jnl |
Inf. Secur. Tech. Rep.
|
| 2009 | J | jnl |
Inf. Secur. Tech. Rep.
|
| 2009 | J | jnl |
Inf. Secur. Tech. Rep.
|
| 2008 | J | jnl |
Inf. Secur. Tech. Rep.
|
| 2007 | J | jnl |
J. Comput. Virol.
|
| 2007 | — | conf |
Security and Management
|