| Year | Rank | Type | Title / Venue / Authors |
|---|---|---|---|
| 2025 | — | conf |
World Conference on Information Security Education
|
| 2025 | — | conf |
SIGCSE (1)
|
| 2025 | — | conf |
SIGCSE (1)
|
| 2024 | — | conf |
JOWO
|
| 2023 | — | conf |
HAISA
|
| 2023 | — | conf |
SIGCSE (1)
|
| 2023 | — | conf |
HICSS
|
| 2023 | J | jnl |
IEEE Secur. Priv.
|
| 2023 | — | conf |
SIGCSE (2)
|
| 2022 | J | jnl |
IEEE Trans. Dependable Secur. Comput.
|
| 2022 | C | conf |
NSPW
|
| 2022 | J | jnl |
CoRR
|
| 2022 | — | conf |
HICSS
|
| 2022 | — | conf |
World Conference on Information Security Education
|
| 2021 | — | conf |
World Conference on Information Security Education
|
| 2021 | J | jnl |
IEEE Trans. Netw. Serv. Manag.
|
| 2021 | — | conf |
World Conference on Information Security Education
|
| 2021 | — | ch. |
IFIP's Exciting First 60+ Years
|
| 2021 | — | conf |
HICSS
|
| 2021 | — | conf |
World Conference on Information Security Education
|
| 2020 | Misc | conf |
ICNC
|
| 2020 | B | conf |
WISE
|
| 2020 | — | conf |
CNS
|
| 2020 | — | conf |
HICSS
|
| 2020 | C | conf |
NSPW
|
| 2019 | J | jnl |
CoRR
|
| 2019 | — | conf |
SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI
|
| 2019 | — | conf |
HICSS
|
| 2019 | — | conf |
World Conference on Information Security Education
|
| 2018 | — | conf |
World Conference on Information Security Education
|
| 2018 | C | conf |
NSPW
|
| 2018 | C | conf |
FIE
|
| 2018 | — | conf |
HICSS
|
| 2018 | J | jnl |
Comput. Secur.
|
| 2018 | — | conf |
HICSS
|
| 2018 | J | jnl |
CoRR
|
| 2018 | C | ed. |
NSPW
|
| 2018 | A | conf |
SIGCSE
|
| 2017 | C | conf |
A Model of Owner Controlled, Full-Provenance, Non-Persistent, High-Availability Information Sharing.
NSPW
|
| 2017 | A | conf |
SIGCSE
|
| 2017 | — | conf |
HICSS
|
| 2017 | — | conf |
World Conference on Information Security Education
|
| 2017 | — | conf |
World Conference on Information Security Education
|
| 2017 | — | ed. |
World Conference on Information Security Education
|
| 2017 | J | jnl |
IEEE Syst. J.
|
| 2017 | — | conf |
HICSS
|
| 2017 | — | conf |
HICSS
|
| 2017 | J | jnl |
ACM Trans. Priv. Secur.
|
| 2017 | J | jnl |
CoRR
|
| 2017 | A* | conf |
INFOCOM
|
| 2017 | — | conf |
DSC
|
| 2016 | A | conf |
ISSRE
|
| 2016 | C | conf |
NSPW
|
| 2016 | C | ed. |
ISC
|
| 2016 | — | conf |
HICSS
|
| 2016 | — | conf |
HICSS
|
| 2016 | — | conf |
IEEE Symposium on Security and Privacy Workshops
|
| 2016 | A | conf |
SIGCSE
|
| 2015 | — | ed. |
World Conference on Information Security Education
|
| 2015 | — | conf |
HICSS
|
| 2015 | — | conf |
World Conference on Information Security Education
|
| 2015 | A | conf |
HotOS
|
| 2015 | J | jnl |
login Usenix Mag.
|
| 2014 | — | conf |
IEEE Symposium on Security and Privacy Workshops
|
| 2014 | — | conf |
IEEE Symposium on Security and Privacy Workshops
|
| 2014 | — | conf |
HICSS
|
| 2013 | C | conf |
NSPW
|
| 2013 | C | conf |
NSPW
|
| 2013 | A | conf |
SIGCSE
|
| 2013 | — | conf |
HICSS
|
| 2013 | J | jnl |
Pattern Recognit. Lett.
|
| 2013 | A | conf |
SIGCSE
|
| 2013 | — | conf |
World Conference on Information Security Education
|
| 2012 | — | conf |
EVT/WOTE
|
| 2012 | J | jnl |
IEEE Trans. Dependable Secur. Comput.
|
| 2012 | — | conf |
HICSS
|
| 2012 | J | jnl |
Int. J. High Perform. Comput. Appl.
|
| 2012 | J | jnl |
IEEE Secur. Priv.
|
| 2012 | A | conf |
SIGCSE
|
| 2012 | C | conf |
NSPW
|
| 2011 | — | conf |
HICSS
|
| 2011 | J | jnl |
ISC Int. J. Inf. Secur.
|
| 2011 | — | conf |
MALWARE
|
| 2011 | — | conf |
TaPP
|
| 2011 | C | conf |
NSPW
|
| 2011 | — | conf |
MALWARE
|
| 2011 | — | conf |
World Conference on Information Security Education
|
| 2011 | — | conf |
HICSS
|
| 2011 | J | jnl |
IEEE Secur. Priv.
|
| 2011 | — | conf |
World Conference on Information Security Education
|
| 2011 | — | conf |
PETRA
|
| 2010 | — | conf |
Insider Threats: Strategies for Prevention, Mitigation, and Response
|
| 2010 | — | conf |
Insider Threats: Strategies for Prevention, Mitigation, and Response
|
| 2010 | J | jnl |
IEEE Secur. Priv.
|
| 2010 | — | ch. |
Insider Threats in Cyber Security
|
| 2010 | — | ch. |
Insider Threats in Cyber Security
|
| 2010 | J | jnl |
IEEE Secur. Priv.
|
| 2010 | C | conf |
SecureComm
|
| 2010 | — | book |
Insider Threats in Cyber Security
|
| 2010 | — | ed. |
Insider Threats: Strategies for Prevention, Mitigation, and Response
|
| 2010 | — | conf |
EVT/WOTE
|
| 2010 | — | conf |
MALWARE
|
| 2010 | A* | conf |
IEEE Symposium on Security and Privacy
|
| 2010 | C | conf |
NSPW
|
| 2010 | J | jnl |
IEEE Secur. Priv.
|
| 2010 | — | conf |
PETRA
|
| 2009 | J | jnl |
ACM SIGCSE Bull.
|
| 2009 | J | jnl |
IEEE Secur. Priv.
|
| 2009 | — | conf |
HICSS
|
| 2009 | — | conf |
HICSS
|
| 2009 | — | conf |
EVT/WOTE
|
| 2009 | B | conf |
ARES
|
| 2009 | J | jnl |
IEEE Secur. Priv.
|
| 2009 | — | conf |
PETRA
|
| 2009 | C | conf |
NSPW
|
| 2009 | A | conf |
ACSAC
|
| 2009 | — | conf |
World Conference on Information Security Education
|
| 2009 | — | conf |
PETRA
|
| 2009 | C | conf |
NSPW
|
| 2009 | — | conf |
HICSS
|
| 2008 | — | conf |
Countering Insider Threats
|
| 2008 | — | conf |
Countering Insider Threats
|
| 2008 | — | conf |
SADFE
|
| 2008 | — | ed. |
Countering Insider Threats
|
| 2008 | — | conf |
CSIIRW
|
| 2008 | J | jnl |
IEEE Secur. Priv.
|
| 2008 | — | conf |
HICSS
|
| 2008 | C | ed. |
NSPW
|
| 2008 | J | jnl |
IEEE Secur. Priv.
|
| 2008 | C | conf |
WETICE
|
| 2008 | J | jnl |
IEEE Secur. Priv.
|
| 2008 | C | conf |
NSPW
|
| 2007 | J | jnl |
IEEE Secur. Priv.
|
| 2007 | J | jnl |
IEEE Secur. Priv.
|
| 2007 | — | conf |
EVT
|
| 2007 | J | jnl |
IEEE Trans. Dependable Secur. Comput.
|
| 2007 | A | conf |
RAID
|
| 2007 | — | conf |
World Conference on Information Security Education
|
| 2007 | J | jnl |
Commun. ACM
|
| 2007 | — | conf |
World Conference on Information Security Education
|
| 2007 | J | jnl |
IEEE Secur. Priv.
|
| 2007 | J | jnl |
ACM Trans. Inf. Syst. Secur.
|
| 2007 | J | jnl |
Commun. ACM
|
| 2007 | C | conf |
WETICE
|
| 2007 | — | conf |
SADFE
|
| 2006 | C | conf |
WETICE
|
| 2006 | C | conf |
NSPW
|
| 2006 | C | conf |
NSPW
|
| 2006 | C | conf |
WETICE
|
| 2006 | C | conf |
WETICE
|
| 2006 | J | jnl |
ACM J. Educ. Resour. Comput.
|
| 2006 | B | conf |
DIMVA
|
| 2006 | J | jnl |
IEEE Secur. Priv.
|
| 2005 | J | jnl |
IEEE Secur. Priv.
|
| 2005 | C | conf |
WETICE
|
| 2005 | C | conf |
NSPW
|
| 2005 | C | conf |
NSPW
|
| 2005 | J | jnl |
IEEE Secur. Priv.
|
| 2005 | C | conf |
NSPW
|
| 2005 | A | conf |
ACSAC
|
| 2004 | J | jnl |
IEEE Secur. Priv.
|
| 2004 | J | jnl |
IEEE Secur. Priv.
|
| 2004 | J | jnl |
Commun. ACM
|
| 2004 | J | jnl |
IEEE Secur. Priv.
|
| 2004 | C | conf |
WETICE
|
| 2004 | — | book |
|
| 2004 | J | jnl |
IEEE Secur. Priv.
|
| 2004 | J | jnl |
IEEE Secur. Priv.
|
| 2004 | J | jnl |
ACM Trans. Inf. Syst. Secur.
|
| 2003 | C | conf |
SEW
|
| 2003 | A | conf |
ACSAC
|
| 2003 | — | conf |
World Conference on Information Security Education
|
| 2003 | C | conf |
WETICE
|
| 2003 | A* | conf |
NDSS
|
| 2003 | J | jnl |
IEEE Secur. Priv.
|
| 2002 | A* | conf |
USENIX Security Symposium
|
| 2002 | J | jnl |
Comput. Secur.
|
| 2001 | C | conf |
WETICE
|
| 2001 | A | conf |
ACSAC
|
| 2000 | — | conf |
CSFW
|
| 2000 | J | jnl |
IEEE Concurr.
|
| 2000 | C | conf |
WETICE
|
| 2000 | J | jnl |
Comput. Networks
|
| 2000 | — | conf |
S&P
|
| 1999 | — | conf |
Recent Advances in Intrusion Detection
|
| 1998 | A | conf |
ACSAC
|
| 1997 | J | jnl |
ACM SIGSOFT Softw. Eng. Notes
|
| 1996 | J | jnl |
Comput. Syst.
|
| 1996 | J | jnl |
J. Comput. Secur.
|
| 1996 | J | jnl |
J. Netw. Syst. Manag.
|
| 1995 | J | jnl |
Comput. Secur.
|
| 1995 | J | jnl |
J. Comput. Secur.
|
| 1993 | Misc | conf |
SEC
|
| 1991 | — | conf |
USENIX Winter
|
| 1991 | — | conf |
Compcon
|
| 1990 | A | conf |
ACSAC
|
| 1990 | J | jnl |
Softw. Pract. Exp.
|
| 1989 | A | conf |
ACSAC
|
| 1989 | — | conf |
Distributed Computing And Cryptography
|
| 1989 | A | conf |
SC
|
| 1988 | J | jnl |
Comput. Syst.
|
| 1988 | — | conf |
CSFW
|
| 1987 | J | jnl |
Softw. Pract. Exp.
|
| 1986 | J | jnl |
Comput. Secur.
|
| 1986 | — | conf |
FJCC
|
| 1981 | A* | conf |
SOSP
|
| 1979 | A* | conf |
SOSP
|