| Year | Rank | Type | Title / Venue / Authors |
|---|---|---|---|
| 2026 | J | jnl |
IEEE Commun. Stand. Mag.
|
| 2025 | J | jnl |
J. Bank. Financial Technol.
|
| 2025 | J | jnl |
Internet Things
|
| 2025 | J | jnl |
Pervasive Mob. Comput.
|
| 2025 | J | jnl |
Expert Syst. Appl.
|
| 2024 | J | jnl |
J. Ambient Intell. Smart Environ.
|
| 2024 | J | jnl |
CoRR
|
| 2024 | J | jnl |
Big Data Min. Anal.
|
| 2024 | J | jnl |
Inf.
|
| 2024 | J | jnl |
Spoofing Against Spoofing: Toward Caller ID Verification in Heterogeneous Telecommunication Systems.
ACM Trans. Priv. Secur.
|
| 2024 | J | jnl |
Int. J. Electron. Secur. Digit. Forensics
|
| 2024 | J | jnl |
Internet Things
|
| 2023 | J | jnl |
Inf.
|
| 2023 | J | jnl |
IEEE Internet Things Mag.
|
| 2023 | J | jnl |
Future Gener. Comput. Syst.
|
| 2023 | J | jnl |
IEEE Access
|
| 2023 | J | jnl |
CoRR
|
| 2022 | J | jnl |
Trans. Emerg. Telecommun. Technol.
|
| 2022 | J | jnl |
Trans. Emerg. Telecommun. Technol.
|
| 2022 | J | jnl |
Trans. Emerg. Telecommun. Technol.
|
| 2022 | J | jnl |
Future Gener. Comput. Syst.
|
| 2022 | J | jnl |
Sensors
|
| 2022 | J | jnl |
Int. J. Appl. Cryptogr.
|
| 2022 | J | jnl |
Trans. Emerg. Telecommun. Technol.
|
| 2022 | J | jnl |
IEEE Access
|
| 2022 | B | conf |
IEEE Big Data
|
| 2021 | J | jnl |
IEEE Internet Things J.
|
| 2021 | J | jnl |
Trans. Emerg. Telecommun. Technol.
|
| 2021 | J | jnl |
IEEE Trans. Intell. Transp. Syst.
|
| 2021 | J | jnl |
Inf. Process. Manag.
|
| 2021 | J | jnl |
ACM Trans. Cyber Phys. Syst.
|
| 2021 | J | jnl |
Future Internet
|
| 2021 | J | jnl |
Comput. Commun.
|
| 2020 | J | jnl |
CoRR
|
| 2020 | J | jnl |
Big Data Cogn. Comput.
|
| 2020 | J | jnl |
IEEE Trans. Ind. Informatics
|
| 2020 | J | jnl |
IEEE Internet Things J.
|
| 2020 | J | jnl |
Inf. Sci.
|
| 2020 | J | jnl |
IEEE Access
|
| 2020 | C | conf |
BDCAT
|
| 2020 | J | jnl |
Ann. des Télécommunications
|
| 2020 | J | jnl |
Future Internet
|
| 2020 | J | jnl |
Future Gener. Comput. Syst.
|
| 2020 | J | jnl |
IEEE Trans. Emerg. Top. Comput.
|
| 2019 | J | jnl |
IET Networks
|
| 2019 | J | jnl |
Future Gener. Comput. Syst.
|
| 2019 | J | jnl |
CoRR
|
| 2019 | J | jnl |
Future Gener. Comput. Syst.
|
| 2019 | B | conf |
ARES
|
| 2019 | J | jnl |
Future Gener. Comput. Syst.
|
| 2019 | J | jnl |
Future Gener. Comput. Syst.
|
| 2019 | J | jnl |
IET Inf. Secur.
|
| 2019 | J | jnl |
Future Gener. Comput. Syst.
|
| 2019 | J | jnl |
IEEE Internet Things J.
|
| 2018 | J | jnl |
CoRR
|
| 2018 | J | jnl |
Comput. Secur.
|
| 2018 | J | jnl |
Comput. Secur.
|
| 2018 | J | jnl |
Future Gener. Comput. Syst.
|
| 2018 | — | ch. |
Guide to Vulnerability Analysis for Computer Networks and Systems
|
| 2018 | J | jnl |
Comput. Secur.
|
| 2017 | Misc | conf |
SAC
|
| 2017 | J | jnl |
J. Comput. Sci.
|
| 2017 | B | conf |
ARES
|
| 2016 | B | conf |
ARES
|
| 2016 | J | jnl |
Secur. Commun. Networks
|
| 2016 | — | — |
|
| 2015 | — | conf |
CSE
|
| 2013 | J | jnl |
IET Commun.
|
| 2011 | Misc | conf |
SoftCOM
|
| 2006 | B | conf |
SECON
|