| Year | Rank | Type | Title / Venue / Authors |
|---|---|---|---|
| 2026 | J | jnl |
CoRR
|
| 2025 | J | jnl |
CoRR
|
| 2025 | B | conf |
IWCMC
|
| 2025 | J | jnl |
Internet Things
|
| 2025 | J | jnl |
IEEE Access
|
| 2025 | J | jnl |
Comput. Networks
|
| 2025 | J | jnl |
IEEE Access
|
| 2025 | J | jnl |
CoRR
|
| 2024 | — | conf |
ICECET
|
| 2024 | J | jnl |
CoRR
|
| 2024 | — | conf |
ICC Workshops
|
| 2024 | J | jnl |
CoRR
|
| 2024 | J | jnl |
IEEE Access
|
| 2024 | — | conf |
ICECET
|
| 2024 | J | jnl |
CoRR
|
| 2024 | J | jnl |
IEEE Access
|
| 2024 | — | conf |
Users' Scenario-Base for Analysing Insider Threat Detection Based on User's Downloads Activity Logs.
FICC (2)
|
| 2024 | J | jnl |
IEEE Access
|
| 2024 | — | conf |
WISE (PhD Symposium, Demos and Workshops)
|
| 2023 | — | conf |
ACR
|
| 2023 | J | jnl |
IEEE Access
|
| 2023 | J | jnl |
CoRR
|
| 2022 | J | jnl |
Comput. Networks
|
| 2022 | J | jnl |
IEEE Access
|
| 2021 | — | conf |
VTC Fall
|
| 2021 | J | jnl |
IEEE Access
|
| 2021 | — | conf |
JCSSE
|
| 2020 | — | conf |
SoCPaR
|
| 2020 | B | conf |
LCN
|
| 2020 | J | jnl |
IEEE Access
|
| 2019 | — | conf |
LCN Symposium
|
| 2019 | — | conf |
ISC2
|
| 2019 | J | jnl |
EAI Endorsed Trans. Security Safety
|
| 2018 | J | jnl |
IEEE Access
|
| 2017 | — | conf |
VTC Spring
|
| 2017 | J | jnl |
IEEE Access
|
| 2017 | — | conf |
ATCS/SePrIoT@SecureComm
|
| 2016 | C | conf |
SNPD
|
| 2016 | — | conf |
ICSPCS
|
| 2016 | — | conf |
LCN Workshops
|
| 2016 | — | conf |
LCN Workshops
|
| 2015 | J | jnl |
Wirel. Networks
|
| 2015 | C | conf |
SNPD
|
| 2015 | C | conf |
SNPD
|
| 2015 | C | conf |
SecureComm
|
| 2014 | C | conf |
WoWMoM
|
| 2014 | B | conf |
ICPADS
|