| Year | Rank | Type | Title / Venue / Authors |
|---|---|---|---|
| 2025 | J | jnl |
PeerJ Comput. Sci.
|
| 2024 | J | jnl |
Algorithms
|
| 2024 | J | jnl |
PeerJ Comput. Sci.
|
| 2024 | J | jnl |
IEEE Access
|
| 2024 | J | jnl |
J. Cloud Comput.
|
| 2023 | J | jnl |
Adv. Eng. Softw.
|
| 2022 | J | jnl |
Appl. Comput. Intell. Soft Comput.
|
| 2022 | J | jnl |
Pac. Asia J. Assoc. Inf. Syst.
|
| 2022 | J | jnl |
PeerJ Comput. Sci.
|
| 2021 | J | jnl |
Comput. Intell. Neurosci.
|
| 2020 | J | jnl |
IEEE Access
|
| 2020 | J | jnl |
An Empirical Comparison on Malicious Activity Detection Using Different Neural Network-Based Models.
IEEE Access
|
| 2020 | J | jnl |
IEEE Access
|
| 2020 | J | jnl |
Secur. Commun. Networks
|
| 2020 | J | jnl |
Sci. Program.
|
| 2020 | — | conf |
IntelliSys (1)
|
| 2020 | J | jnl |
Multim. Tools Appl.
|
| 2020 | J | jnl |
EURASIP J. Wirel. Commun. Netw.
|
| 2019 | — | conf |
ACIS
|
| 2019 | — | — |
|
| 2018 | — | conf |
AMCIS
|
| 2017 | — | conf |
ISD
|
| 2017 | — | conf |
ISD
|
| 2016 | — | conf |
AMCIS
|
| 2016 | — | conf |
ISD
|