| Year | Rank | Type | Title / Venue / Authors |
|---|---|---|---|
| 2025 | J | jnl |
Comput. Networks
|
| 2025 | J | jnl |
TrojanProbe: Fingerprinting Trojan tunnel implementations by actively probing crafted HTTP requests.
Comput. Secur.
|
| 2024 | J | jnl |
Comput. Secur.
|
| 2023 | J | jnl |
IEEE Trans. Netw. Serv. Manag.
|
| 2021 | J | jnl |
Comput. Secur.
|
| 2021 | J | jnl |
Comput. Secur.
|
| 2020 | — | conf |
MSN
|
| 2019 | J | jnl |
Trans. Inst. Meas. Control
|
| 2018 | J | jnl |
IEEE Trans. Dependable Secur. Comput.
|
| 2017 | — | conf |
LSMS/ICSEE (3)
|
| 2017 | — | conf |
LSMS/ICSEE (2)
|
| 2016 | J | jnl |
IET Commun.
|
| 2016 | J | jnl |
Comput. J.
|
| 2015 | J | jnl |
Knowl. Based Syst.
|
| 2015 | J | jnl |
IEEE Trans. Inf. Forensics Secur.
|
| 2013 | J | jnl |
Comput. Secur.
|
| 2013 | J | jnl |
Comput. Networks
|
| 2012 | C | conf |
SecureComm
|
| 2012 | J | jnl |
IEEE Trans. Dependable Secur. Comput.
|
| 2011 | A | conf |
DSN
|
| 2011 | A | conf |
ACSAC
|
| 2011 | A* | conf |
NDSS
|
| 2011 | J | jnl |
CoRR
|