| Year | Rank | Type | Title / Venue / Authors |
|---|---|---|---|
| 2025 | — | conf |
Information Security in a Connected World
|
| 2024 | J | jnl |
Comput. Law Secur. Rev.
|
| 2024 | J | jnl |
Comput. Law Secur. Rev.
|
| 2019 | J | jnl |
Comput. Secur.
|
| 2016 | J | jnl |
Comput. Law Secur. Rev.
|
| 2012 | J | jnl |
Comput. Law Secur. Rev.
|
| 2010 | J | jnl |
Comput. Law Secur. Rev.
|
| 2010 | C | conf |
ISTAS
|
| 2010 | Misc | conf |
AISC
|
| 2010 | C | conf |
ISTAS
|
| 2010 | J | jnl |
Comput. Law Secur. Rev.
|
| 2009 | J | jnl |
IEEE Technol. Soc. Mag.
|
| 2007 | — | conf |
EGOV
|
| 2006 | J | jnl |
J. Theor. Appl. Electron. Commer. Res.
|