| Year | Rank | Type | Title / Venue / Authors |
|---|---|---|---|
| 2017 | — | conf |
CCWC
|
| 2017 | — | conf |
CCWC
|
| 2011 | — | conf |
WSOM
|
| 2011 | — | conf |
ICANN (2)
|
| 2010 | — | conf |
ICONIP (2)
|
| 2010 | — | conf |
Security and Management
|
| 2010 | — | conf |
ICONIP (2)
|
| 2009 | — | conf |
ICONIP (2)
|
| 2009 | — | conf |
WSOM
|
| 2009 | — | conf |
Security and Management
|
| 2008 | — | conf |
Security and Management
|
| 2008 | B | conf |
IJCNN
|
| 2007 | — | conf |
Security and Management
|
| 2006 | — | conf |
The Analyses of Key Stroke Timings using Self Organizing Maps and its Application to Authentication.
Security and Management
|
| 2006 | B | conf |
IJCNN
|
| 2005 | — | conf |
Security and Management
|
| 2004 | — | conf |
Security and Management
|