| Year | Rank | Type | Title / Venue / Authors |
|---|---|---|---|
| 2017 | — | conf |
IEEE Symposium on Security and Privacy Workshops
|
| 2016 | — | conf |
WIFS
|
| 2014 | — | conf |
INFOCOM Workshops
|
| 2013 | Misc | conf |
PAAMS
|
| 2013 | Misc | conf |
PAAMS
|
| 2013 | J | jnl |
Wirel. Pers. Commun.
|
| 2013 | J | jnl |
Wirel. Pers. Commun.
|
| 2012 | B | conf |
TrustCom
|
| 2012 | J | jnl |
Inf. Sci.
|
| 2011 | C | conf |
SECRYPT
|
| 2011 | — | conf |
DCNET/OPTICS
|
| 2010 | — | conf |
AICT
|
| 2009 | — | conf |
AP2PS
|
| 2009 | J | jnl |
Comput. Secur.
|
| 2009 | — | conf |
AP2PS
|
| 2009 | J | jnl |
IEEE Wirel. Commun.
|
| 2009 | J | jnl |
IEEE Trans. Inf. Forensics Secur.
|
| 2008 | J | jnl |
Comput. Secur.
|
| 2007 | J | jnl |
Comput. Networks
|
| 2007 | C | conf |
CRITIS
|
| 2006 | A | conf |
ESORICS
|
| 2006 | — | conf |
SPC
|
| 2006 | C | conf |
Mathematical Foundations for the Design of a Low-Rate DoS Attack to Iterative Servers (Short Paper).
ICICS
|
| 2006 | C | conf |
SECRYPT
|
| 2006 | C | conf |
CRITIS
|
| 2005 | C | conf |
ISCC
|
| 2004 | J | jnl |
Comput. Commun.
|
| 2004 | J | jnl |
Comput. Networks
|
| 2004 | — | conf |
ICCSA (1)
|
| 2003 | J | jnl |
Comput. Networks
|
| 2003 | — | conf |
IWIA
|