| Year | Rank | Type | Title / Venue / Authors |
|---|---|---|---|
| 2026 | — | conf |
ITASEC/SERICS
|
| 2025 | J | jnl |
IEEE Trans. Dependable Secur. Comput.
|
| 2025 | J | jnl |
CoRR
|
| 2025 | A | conf |
AsiaCCS
|
| 2025 | J | jnl |
CoRR
|
| 2024 | J | jnl |
CoRR
|
| 2024 | J | jnl |
CoRR
|
| 2024 | J | jnl |
IEEE Trans. Dependable Secur. Comput.
|
| 2024 | — | conf |
ESORICS (1)
|
| 2024 | J | jnl |
CoRR
|
| 2024 | A | conf |
ACSAC
|
| 2023 | J | jnl |
CoRR
|
| 2023 | J | jnl |
IEEE Trans. Inf. Forensics Secur.
|
| 2023 | J | jnl |
CoRR
|
| 2023 | J | jnl |
CoRR
|
| 2022 | J | jnl |
Evading behavioral classifiers: a comprehensive analysis on evading ransomware detection techniques.
Neural Comput. Appl.
|
| 2022 | J | jnl |
CoRR
|
| 2022 | — | conf |
ESORICS (3)
|
| 2022 | A | conf |
DSN
|
| 2022 | J | jnl |
Neural Comput. Appl.
|
| 2022 | J | jnl |
CoRR
|
| 2021 | J | jnl |
IEEE Intell. Syst.
|
| 2021 | J | jnl |
CoRR
|
| 2021 | A | conf |
AsiaCCS
|
| 2021 | J | jnl |
CoRR
|
| 2021 | J | jnl |
CoRR
|
| 2021 | J | jnl |
CoRR
|
| 2020 | J | jnl |
IEEE Trans. Emerg. Top. Comput.
|
| 2020 | J | jnl |
CoRR
|
| 2020 | B | conf |
NSS
|
| 2020 | J | jnl |
CoRR
|
| 2020 | — | ch. |
Adaptive Autonomous Secure Cyber Systems
|
| 2020 | J | jnl |
IEEE Trans. Inf. Forensics Secur.
|
| 2020 | — | conf |
ACNS (2)
|
| 2019 | — | conf |
SDS
|
| 2019 | — | conf |
SDS
|
| 2019 | — | conf |
SDS
|
| 2019 | — | conf |
IoTSMS
|
| 2019 | J | jnl |
CoRR
|
| 2018 | — | conf |
From Database to Cyber Security
|
| 2018 | J | jnl |
CoRR
|
| 2018 | J | jnl |
CoRR
|
| 2018 | J | jnl |
CoRR
|
| 2018 | J | jnl |
CoRR
|
| 2018 | — | conf |
ICMCIS
|
| 2017 | C | conf |
GPC
|
| 2017 | Misc | conf |
ICISS
|
| 2016 | — | conf |
SafeConfig@CCS
|
| 2016 | J | jnl |
CoRR
|
| 2015 | — | conf |
CODASPY
|
| 2015 | J | jnl |
Int. J. Secur. Networks
|
| 2015 | J | jnl |
CoRR
|
| 2015 | J | jnl |
IEEE/ACM Trans. Netw.
|
| 2014 | J | jnl |
CoRR
|
| 2013 | J | jnl |
CoRR
|
| 2013 | J | jnl |
CoRR
|
| 2013 | A* | conf |
INFOCOM
|
| 2013 | — | conf |
INFOCOM Workshops
|
| 2013 | C | conf |
CRiSIS
|
| 2012 | C | conf |
SECRYPT
|
| 2012 | A* | conf |
INFOCOM
|
| 2011 | — | conf |
SRDS Workshops
|
| 2011 | — | conf |
NTMS
|
| 2011 | J | jnl |
Secur. Commun. Networks
|
| 2011 | J | jnl |
IEEE Trans. Dependable Secur. Comput.
|
| 2010 | J | jnl |
J. Comput. Secur.
|
| 2010 | — | conf |
MOBIWAC
|
| 2010 | J | jnl |
Secur. Commun. Networks
|
| 2009 | J | jnl |
IEEE Trans. Computers
|
| 2009 | J | jnl |
Inf. Fusion
|
| 2009 | J | jnl |
EURASIP J. Wirel. Commun. Netw.
|
| 2009 | J | jnl |
Ad Hoc Networks
|
| 2009 | J | jnl |
Secur. Commun. Networks
|
| 2009 | — | conf |
EuroPKI
|
| 2009 | C | conf |
SecureComm
|
| 2009 | — | conf |
WWIC
|
| 2009 | J | jnl |
CoRR
|
| 2008 | Misc | conf |
SEC
|
| 2008 | A* | conf |
PerCom
|
| 2008 | — | conf |
WISEC
|
| 2008 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2008 | J | jnl |
ACM Trans. Inf. Syst. Secur.
|
| 2008 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2008 | C | conf |
SecureComm
|
| 2008 | J | jnl |
Concurr. Comput. Pract. Exp.
|
| 2007 | B | conf |
MobiHoc
|
| 2007 | A | conf |
AsiaCCS
|
| 2007 | — | conf |
BIOWIRE
|
| 2007 | J | jnl |
Ad Hoc Networks
|
| 2007 | — | ch. |
Spatial Data on the Web
|
| 2007 | — | ed. |
WCAN@ICALP
|
| 2007 | — | conf |
PerCom Workshops
|
| 2007 | J | jnl |
J. Comput. Secur.
|
| 2007 | A | conf |
IPDPS
|
| 2006 | A | conf |
ICDCS
|
| 2006 | Misc | conf |
SAC
|
| 2006 | A | conf |
AsiaCCS
|
| 2006 | — | conf |
WCAN@ICALP
|
| 2006 | J | jnl |
Wirel. Networks
|
| 2006 | — | conf |
WCAN@ICALP
|
| 2006 | B | conf |
SMC
|
| 2006 | C | conf |
DS-RT
|
| 2006 | — | conf |
PerCom Workshops
|
| 2006 | C | conf |
SecureComm
|
| 2005 | — | conf |
EuroIMSA
|
| 2005 | J | jnl |
J. Comput. Syst. Sci.
|
| 2005 | C | conf |
SecureComm
|
| 2005 | C | conf |
SecureComm
|
| 2004 | A | conf |
ESORICS
|
| 2004 | C | conf |
SACMAT
|
| 2004 | — | conf |
HOT-P2P
|
| 2004 | — | conf |
SASN
|
| 2004 | A | conf |
IPDPS
|
| 2004 | B | conf |
DBSec
|
| 2004 | J | jnl |
J. Comput. Secur.
|
| 2004 | C | conf |
SACMAT
|
| 2003 | B | conf |
SRDS
|
| 2003 | Misc | conf |
SEC
|
| 2003 | — | conf |
ICPP Workshops
|
| 2003 | J | jnl |
Ad Hoc Networks
|
| 2003 | — | conf |
SASN
|
| 2003 | J | jnl |
IEEE Trans. Parallel Distributed Syst.
|
| 2003 | J | jnl |
Commun. ACM
|
| 2002 | J | jnl |
ACM Trans. Inf. Syst. Secur.
|
| 2002 | B | conf |
FoSSaCS
|
| 2002 | A | conf |
ESORICS
|
| 2002 | — | conf |
POMC
|
| 2002 | — | conf |
FASec
|
| 2002 | J | jnl |
ACM Trans. Inf. Syst. Secur.
|
| 2002 | Misc | conf |
SEC
|
| 2001 | B | conf |
FoSSaCS
|
| 2001 | — | conf |
GETGRATS Closing Workshop
|
| 2001 | C | conf |
SACMAT
|
| 2000 | A | conf |
ESORICS
|
| 2000 | J | jnl |
IEEE Trans. Knowl. Data Eng.
|
| 2000 | — | conf |
Annual Linux Showcase & Conference
|
| 2000 | J | jnl |
Distributed Parallel Databases
|
| 2000 | A* | conf |
CCS
|
| 2000 | — | conf |
IPDPS Workshops
|
| 1999 | J | jnl |
IEEE Trans. Parallel Distributed Syst.
|
| 1999 | Misc | conf |
PDPTA
|
| 1999 | — | ed. |
IPPS/SPDP Workshops
|
| 1998 | — | conf |
CSFW
|
| 1998 | J | jnl |
IEEE Trans. Knowl. Data Eng.
|
| 1998 | — | conf |
ICATPN
|
| 1997 | — | conf |
IPPS
|
| 1997 | — | ch. |
Advanced Transaction Models and Architectures
|
| 1997 | J | jnl |
Formal Aspects Comput.
|
| 1996 | A* | conf |
CCS
|
| 1996 | A | conf |
ESORICS
|
| 1996 | B | conf |
DBSec
|
| 1995 | J | jnl |
Real Time Syst.
|
| 1994 | — | conf |
S&P
|
| 1994 | A | conf |
ESORICS
|
| 1994 | J | jnl |
Real Time Syst.
|
| 1993 | — | conf |
PARLE
|
| 1993 | J | jnl |
Softw. Pract. Exp.
|
| 1992 | J | jnl |
Microprocess. Microsystems
|
| 1992 | — | conf |
POS
|
| 1992 | — | conf |
POS
|
| 1991 | B | conf |
SRDS
|
| 1991 | J | jnl |
Comput. J.
|
| 1991 | B | conf |
SRDS
|
| 1989 | J | jnl |
Comput. J.
|
| 1989 | J | jnl |
J. Syst. Softw.
|
| 1988 | J | jnl |
Softw. Pract. Exp.
|
| 1988 | J | jnl |
Comput. Syst. Sci. Eng.
|
| 1988 | — | conf |
FTRTFT
|
| 1987 | — | conf |
Experiences with Distributed Systems
|
| 1986 | — | conf |
ACM Conference on Computer Science
|
| 1986 | J | jnl |
IEEE Trans. Software Eng.
|