| Year | Rank | Type | Title / Venue / Authors |
|---|---|---|---|
| 2015 | C | conf |
ISC
|
| 2010 | — | ch. |
Insider Threats in Cyber Security
|
| 2009 | J | jnl |
J. Syst. Archit.
|
| 2009 | Misc | conf |
SEC
|
| 2009 | — | conf |
SECURWARE
|
| 2009 | — | conf |
ESSoS
|
| 2008 | — | conf |
SESS
|
| 2008 | — | conf |
RELAW
|
| 2007 | — | conf |
WEBIST (Selected Papers)
|
| 2006 | J | jnl |
Reliab. Eng. Syst. Saf.
|
| 2006 | — | conf |
ICAS
|
| 2006 | — | conf |
AINA (2)
|
| 2006 | J | jnl |
Int. Trans. Syst. Sci. Appl.
|
| 2006 | — | conf |
DEXA Workshops
|
| 2006 | — | conf |
DEXA Workshops
|
| 2005 | — | conf |
SOAS
|
| 2005 | — | conf |
SOAS
|
| 2005 | — | conf |
ECBS
|
| 2005 | — | conf |
WRAC
|