| Year | Rank | Type | Title / Venue / Authors |
|---|---|---|---|
| 2024 | B | conf |
KES
|
| 2023 | J | jnl |
Wirel. Networks
|
| 2023 | J | jnl |
IEEE Access
|
| 2022 | J | jnl |
Expert Syst. Appl.
|
| 2021 | J | jnl |
ACM Trans. Internet Techn.
|
| 2021 | — | conf |
NTMS
|
| 2021 | J | jnl |
CoRR
|
| 2021 | — | conf |
ICDF2C
|
| 2021 | — | conf |
MENACOMM
|
| 2021 | J | jnl |
CoRR
|
| 2020 | B | conf |
NOMS
|
| 2020 | J | jnl |
WIREs Data Mining Knowl. Discov.
|
| 2020 | — | conf |
ICETE (2)
|
| 2019 | C | conf |
AICCSA
|
| 2019 | J | jnl |
CoRR
|
| 2019 | B | conf |
IWCMC
|
| 2019 | C | conf |
IDEAS
|
| 2019 | J | jnl |
IEEE Trans. Cloud Comput.
|
| 2019 | C | conf |
AICCSA
|
| 2019 | J | jnl |
CoRR
|
| 2019 | C | conf |
IDEAS
|
| 2019 | C | conf |
IDEAS
|
| 2018 | C | conf |
AICCSA
|
| 2018 | — | conf |
ICC
|
| 2018 | — | conf |
AIMS
|
| 2017 | — | conf |
FACS
|
| 2017 | J | jnl |
Protecting from Cloud-based SIP flooding attacks by leveraging temporal and structural fingerprints.
Comput. Secur.
|
| 2017 | C | conf |
CLOSER
|
| 2016 | — | conf |
CSE/EUC/DCABES
|
| 2016 | J | jnl |
CoRR
|
| 2016 | C | conf |
SECRYPT
|
| 2015 | B | conf |
EDOC
|
| 2015 | — | conf |
CyberSA
|
| 2014 | — | conf |
IEEE CLOUD
|
| 2014 | A | conf |
ICSOC
|
| 2013 | J | jnl |
Comput. Networks
|
| 2013 | — | conf |
ICDCS Workshops
|
| 2013 | — | conf |
IEEE CLOUD
|
| 2013 | — | conf |
BigData Congress
|
| 2013 | C | conf |
ICICS
|
| 2012 | J | jnl |
CoRR
|
| 2012 | C | conf |
CloudCom
|
| 2011 | J | jnl |
Inf. Secur. Tech. Rep.
|
| 2011 | — | conf |
Integrated Network Management
|
| 2011 | C | conf |
SIN
|
| 2010 | B | conf |
NSS
|
| 2010 | — | conf |
EUNICE
|
| 2010 | B | conf |
CNSM
|
| 2009 | — | conf |
ICC
|
| 2009 | — | — |
|
| 2008 | A | conf |
RAID
|
| 2007 | — | conf |
IPTComm
|
| 2007 | — | conf |
AIMS
|
| 2007 | — | conf |
Integrated Network Management
|