| Year | Rank | Type | Title / Venue / Authors |
|---|---|---|---|
| 2023 | J | jnl |
Empir. Softw. Eng.
|
| 2023 | B | conf |
ARES
|
| 2023 | J | jnl |
Sci. Comput. Program.
|
| 2022 | A | conf |
SANER
|
| 2021 | A | conf |
SANER
|
| 2019 | J | jnl |
CoRR
|
| 2019 | — | conf |
AISec@CCS
|
| 2018 | B | conf |
ARES
|
| 2017 | J | jnl |
Comput. Networks
|
| 2017 | A* | conf |
ASE
|
| 2016 | J | jnl |
IEEE Internet Comput.
|
| 2016 | B | conf |
Networking
|
| 2016 | A | conf |
ICSME
|
| 2015 | A* | conf |
ACM Multimedia
|
| 2015 | — | conf |
CNS
|
| 2015 | Misc | conf |
SEC
|
| 2015 | — | conf |
CODASPY
|
| 2015 | — | conf |
ESEC/SIGSOFT FSE
|
| 2014 | C | conf |
SCAM
|
| 2014 | — | conf |
WISCS@CCS
|
| 2014 | A* | conf |
ACM Multimedia
|
| 2014 | B | conf |
PAM
|
| 2013 | — | conf |
FhMN@SIGCOMM
|
| 2013 | J | jnl |
Comput. Commun. Rev.
|
| 2013 | B | conf |
MASCOTS
|
| 2012 | J | jnl |
Inf. Softw. Technol.
|
| 2012 | C | conf |
SCAM
|
| 2012 | — | conf |
UIC/ATC
|
| 2011 | J | jnl |
Int. J. Mob. Comput. Multim. Commun.
|
| 2011 | B | conf |
TrustBus
|
| 2010 | B | conf |
ARES
|
| 2010 | — | conf |
PrimeLife
|
| 2010 | — | conf |
SESS@ICSE
|
| 2009 | B | conf |
ARES
|
| 2009 | J | jnl |
Digit. Investig.
|
| 2009 | B | conf |
ARES
|
| 2009 | C | conf |
ICSEA
|
| 2009 | B | conf |
ARES
|
| 2008 | B | conf |
ARES
|
| 2008 | J | jnl |
Digit. Investig.
|
| 2008 | B | conf |
ARES
|
| 2007 | J | jnl |
Int. J. Inf. Secur. Priv.
|
| 2007 | B | conf |
ARES
|
| 2007 | B | conf |
ARES
|
| 2007 | J | jnl |
IEEE Trans. Syst. Man Cybern. Part A
|
| 2007 | — | conf |
POLICY
|
| 2007 | — | ed. |
Peer-to-Peer Computing
|
| 2007 | Misc | conf |
SEC
|
| 2007 | J | jnl |
Inf. Manag. Comput. Secur.
|
| 2007 | — | conf |
CHIMIT
|
| 2006 | A* | conf |
AAAI
|
| 2006 | — | conf |
DEXA Workshops
|
| 2006 | Misc | conf |
SEC
|
| 2006 | B | conf |
PIMRC
|
| 2006 | — | conf |
KDLL
|
| 2006 | — | conf |
WINSYS
|
| 2006 | — | conf |
ICSM
|
| 2006 | Misc | conf |
SEC
|
| 2006 | — | conf |
ISWCS
|
| 2006 | B | conf |
ESWC
|
| 2006 | — | ed. |
Peer-to-Peer Computing
|
| 2006 | — | conf |
SESS@ICSE
|
| 2005 | C | conf |
WETICE
|
| 2005 | C | conf |
WETICE
|
| 2005 | — | conf |
DEXA Workshops
|
| 2005 | — | ed. |
Peer-to-Peer Computing
|
| 2005 | J | jnl |
Comput. Secur.
|
| 2005 | A | conf |
ASSETS
|
| 2004 | — | ed. |
Peer-to-Peer Computing
|
| 2004 | B | conf |
PIMRC
|
| 2004 | J | jnl |
IEEE Pervasive Comput.
|
| 2004 | — | conf |
SMC (4)
|
| 2003 | — | ed. |
Peer-to-Peer Computing
|
| 2003 | Misc | conf |
SEC
|
| 2003 | C | conf |
WETICE
|
| 2003 | — | conf |
WWW (Posters)
|
| 2002 | — | ed. |
Peer-to-Peer Computing
|
| 2002 | C | conf |
ISMIS
|
| 2002 | — | conf |
SMC (2)
|
| 2002 | — | conf |
Peer-to-Peer Computing
|
| 2001 | — | ed. |
Peer-to-Peer Computing
|
| 2001 | A* | conf |
CHI
|
| 2001 | — | conf |
HICSS
|
| 2001 | C | conf |
WETICE
|
| 2001 | — | conf |
User Modeling
|
| 2001 | — | conf |
WELCOM
|
| 2001 | A* | conf |
EC
|
| 2000 | J | jnl |
J. Intell. Inf. Syst.
|
| 2000 | C | conf |
WETICE
|
| 2000 | C | conf |
ISMIS
|
| 2000 | J | jnl |
Internet Res.
|
| 2000 | C | conf |
WETICE
|
| 1999 | C | conf |
WETICE
|
| 1999 | C | conf |
WETICE
|
| 1999 | C | conf |
ISMIS
|
| 1999 | — | conf |
HICSS
|
| 1998 | — | conf |
HICSS (5)
|
| 1998 | — | conf |
HICSS (5)
|
| 1998 | — | conf |
DEXA Workshop
|
| 1998 | — | conf |
HICSS (4)
|
| 1997 | — | conf |
Description Logics
|
| 1997 | C | conf |
WETICE
|
| 1996 | — | conf |
PAAM
|
| 1995 | J | jnl |
J. Syst. Softw.
|
| 1994 | J | jnl |
J. Syst. Softw.
|
| 1993 | — | conf |
ICSM
|
| 1993 | J | jnl |
Microprocess. Microprogramming
|
| 1993 | — | conf |
AADEBUG
|
| 1992 | J | jnl |
LOPLAS
|
| 1992 | — | conf |
PLILP
|
| 1991 | A* | conf |
PLDI
|
| 1990 | B | conf |
CC
|
| 1990 | — | conf |
PLILP
|
| 1990 | — | conf |
ICSM
|
| 1988 | — | conf |
SIGSMALL/PC
|