| Year | Rank | Type | Title / Venue / Authors |
|---|---|---|---|
| 2016 | A* | conf |
USENIX Security Symposium
|
| 2015 | A* | conf |
IEEE Symposium on Security and Privacy
|
| 2015 | A* | conf |
USENIX Security Symposium
|
| 2014 | — | conf |
WOOT
|
| 2013 | A* | conf |
NDSS
|
| 2012 | A* | conf |
CCS
|
| 2011 | — | ch. |
Encyclopedia of Cryptography and Security (2nd Ed.)
|
| 2011 | A* | conf |
USENIX Security Symposium
|
| 2010 | J | jnl |
ACM Trans. Internet Techn.
|
| 2010 | — | conf |
LEET
|
| 2010 | J | jnl |
login Usenix Mag.
|
| 2009 | J | jnl |
ACM Queue
|
| 2009 | J | jnl |
Commun. ACM
|
| 2008 | — | ed. |
HotSec
|
| 2008 | A* | conf |
USENIX Security Symposium
|
| 2008 | A* | conf |
NDSS
|
| 2008 | — | conf |
LEET
|
| 2008 | B | conf |
ACNS
|
| 2008 | A* | conf |
USENIX Security Symposium
|
| 2008 | — | book |
Virtual Honeypots - From Botnet Tracking to Intrusion Detection.
|
| 2007 | — | ed. |
HotBots
|
| 2007 | A* | ed. |
USENIX Security Symposium
|
| 2007 | — | conf |
HotBots
|
| 2006 | — | conf |
SRUTI
|
| 2006 | J | jnl |
RFC
|
| 2006 | B | conf |
IWQoS
|
| 2006 | — | conf |
WORM
|
| 2005 | A | conf |
Internet Measurement Conference
|
| 2005 | — | ch. |
Encyclopedia of Cryptography and Security
|
| 2004 | A* | conf |
USENIX Security Symposium
|
| 2003 | J | jnl |
IEEE Secur. Priv.
|
| 2003 | A* | conf |
USENIX Security Symposium
|
| 2003 | A* | conf |
USENIX Security Symposium
|
| 2003 | — | — |
|
| 2002 | A* | conf |
NDSS
|
| 2001 | A* | conf |
USENIX Security Symposium
|
| 2001 | — | conf |
LISA
|
| 2000 | — | conf |
Annual Linux Showcase & Conference
|
| 2000 | A* | conf |
USENIX Security Symposium
|
| 2000 | — | conf |
USENIX ATC, FREENIX Track
|
| 2000 | J | jnl |
RFC
|
| 1999 | — | conf |
USENIX ATC, FREENIX Track
|
| 1999 | — | conf |
USENIX ATC, FREENIX Track
|