| Year | Rank | Type | Title / Venue / Authors |
|---|---|---|---|
| 2025 | A | conf |
DSN
|
| 2025 | — | conf |
EICC
|
| 2025 | J | jnl |
CoRR
|
| 2025 | J | jnl |
Commun. ACM
|
| 2025 | — | conf |
iMETA
|
| 2025 | J | jnl |
ACM Comput. Surv.
|
| 2025 | B | conf |
PAM
|
| 2025 | — | conf |
EDCC-C
|
| 2025 | — | conf |
ISSTA Companion
|
| 2025 | J | jnl |
CoRR
|
| 2025 | A | conf |
IMC
|
| 2023 | — | conf |
DSN-S
|
| 2023 | — | conf |
EuroS&P Workshops
|
| 2023 | A | conf |
IMC
|
| 2023 | — | conf |
TMA
|
| 2023 | J | jnl |
ACM Comput. Surv.
|
| 2022 | — | conf |
DSN (Supplements)
|
| 2022 | C | conf |
ISPEC
|
| 2022 | — | conf |
CloudNet
|
| 2021 | — | conf |
SP (Workshops)
|
| 2020 | — | conf |
ICSOC Workshops
|
| 2018 | J | jnl |
CoRR
|
| 2018 | J | jnl |
ACM Comput. Surv.
|
| 2017 | A | ed. |
RAID
|
| 2017 | J | jnl |
IEEE Secur. Priv.
|
| 2016 | J | jnl |
Dagstuhl Reports
|
| 2016 | A | ed. |
RAID
|
| 2016 | J | jnl |
Secur. Commun. Networks
|
| 2016 | C | conf |
VizSEC
|
| 2015 | A* | conf |
USENIX Security Symposium
|
| 2015 | A* | conf |
NDSS
|
| 2014 | J | jnl |
IEEE Secur. Priv.
|
| 2014 | — | conf |
ICC
|
| 2014 | J | jnl |
Dagstuhl Reports
|
| 2012 | J | jnl |
Dagstuhl Reports
|
| 2012 | — | conf |
ICDCS Workshops
|
| 2011 | — | conf |
CEAS
|
| 2011 | J | jnl |
Future Gener. Comput. Syst.
|
| 2011 | — | conf |
Dependable and Historic Computing
|
| 2011 | — | conf |
SysSec@DIMVA
|
| 2010 | A | conf |
RAID
|
| 2010 | — | ch. |
Cyber Situational Awareness
|
| 2010 | — | ch. |
Cyber Situational Awareness
|
| 2010 | J | jnl |
SIGKDD Explor.
|
| 2009 | — | conf |
KDD Workshop on CyberSecurity and Intelligence Informatics
|
| 2009 | B | conf |
NSS
|
| 2009 | — | ed. |
KDD Workshop on CyberSecurity and Intelligence Informatics
|
| 2009 | J | jnl |
Commun. ACM
|
| 2009 | Misc | conf |
ICISS
|
| 2008 | — | conf |
Network Attack Detection and Defense
|
| 2008 | — | conf |
Network Attack Detection and Defense
|
| 2008 | J | jnl |
Digit. Investig.
|
| 2008 | — | conf |
ICDM Workshops
|
| 2008 | A | conf |
RAID
|
| 2008 | Misc | conf |
EDCC
|
| 2008 | B | conf |
NOMS
|
| 2008 | B | conf |
DIMVA
|
| 2008 | J | jnl |
Int. J. Crit. Infrastructures
|
| 2007 | — | conf |
ASIAN
|
| 2007 | J | jnl |
CoRR
|
| 2007 | J | jnl |
CoRR
|
| 2006 | A | conf |
RAID
|
| 2006 | — | ch. |
Quality of Protection
|
| 2006 | Misc | conf |
EDCC
|
| 2005 | — | conf |
SADFE
|
| 2005 | A | conf |
ACSAC
|
| 2005 | — | conf |
SADFE
|
| 2004 | C | conf |
PRDC
|
| 2002 | A* | conf |
KDD
|
| 2000 | A* | conf |
NDSS
|
| 2000 | J | jnl |
Ann. des Télécommunications
|
| 2000 | J | jnl |
J. Comput. Secur.
|
| 2000 | — | conf |
Recent Advances in Intrusion Detection
|
| 1999 | — | conf |
Recent Advances in Intrusion Detection
|
| 1999 | J | jnl |
Comput. Networks
|
| 1999 | — | conf |
FTCS
|
| 1999 | J | jnl |
Comput. Networks
|
| 1998 | A | conf |
ESORICS
|
| 1996 | Misc | conf |
SEC
|
| 1994 | A | conf |
ESORICS
|
| 1994 | — | — |
|
| 1993 | — | conf |
CSFW
|