| Year | Rank | Type | Title / Venue / Authors |
|---|---|---|---|
| 2021 | B | conf |
ARES
|
| 2021 | C | conf |
Intrusion Detection for Industrial Control Systems by Machine Learning using Privileged Information.
ISI
|
| 2020 | B | conf |
TrustCom
|
| 2019 | C | conf |
EDUCON
|
| 2019 | C | conf |
CRiSIS
|
| 2019 | — | conf |
ISMICT
|
| 2019 | — | conf |
SmartBlock
|
| 2018 | — | conf |
ECSA (Companion)
|
| 2018 | — | conf |
ICETE (1)
|
| 2018 | C | conf |
Cyber-Risks in the Industrial Internet of Things (IIoT): Towards a Method for Continuous Assessment.
ISC
|
| 2007 | J | jnl |
Fundam. Informaticae
|
| 2007 | — | conf |
ASYNC
|
| 2006 | — | conf |
ACSD
|
| 2006 | J | jnl |
Fundam. Informaticae
|
| 2005 | — | conf |
ACSD
|
| 2004 | A* | conf |
DAC
|
| 2004 | J | jnl |
Inf. Process. Lett.
|
| 2004 | — | conf |
25 Years Communicating Sequential Processes
|
| 2004 | — | conf |
ACSD
|
| 2003 | — | conf |
ASYNC
|
| 2002 | — | conf |
Concurrency and Hardware Design
|
| 2002 | — | conf |
PATMOS
|
| 2000 | A | conf |
DATE
|
| 1999 | J | jnl |
Proc. IEEE
|
| 1999 | J | jnl |
Proc. IEEE
|
| 1999 | J | jnl |
Proc. IEEE
|
| 1998 | B | conf |
MPC
|
| 1998 | J | jnl |
Softw. Test. Verification Reliab.
|
| 1997 | J | jnl |
Formal Aspects Comput.
|
| 1996 | J | jnl |
IEEE Trans. Very Large Scale Integr. Syst.
|
| 1996 | — | conf |
ASYNC
|
| 1995 | — | conf |
ASYNC
|
| 1995 | — | conf |
ASYNC
|
| 1994 | — | conf |
ASYNC
|
| 1994 | J | jnl |
Formal Aspects Comput.
|
| 1993 | — | conf |
Asynchronous Design Methodologies
|
| 1993 | — | conf |
Asynchronous Design Methodologies
|
| 1992 | — | conf |
Designing Correct Circuits
|
| 1992 | J | jnl |
Acta Informatica
|
| 1990 | — | conf |
Programming Concepts and Methods
|
| 1990 | A* | conf |
CAV
|
| 1990 | — | conf |
CAV (DIMACS/AMS volume)
|
| 1990 | B | conf |
CONCUR
|
| 1989 | J | jnl |
Theor. Comput. Sci.
|
| 1988 | J | jnl |
Distributed Comput.
|
| 1988 | J | jnl |
Inf. Process. Lett.
|
| 1986 | J | jnl |
Sci. Comput. Program.
|
| 1986 | — | — |