| Year | Rank | Type | Title / Venue / Authors |
|---|---|---|---|
| 2025 | — | conf |
SC Workshops
|
| 2025 | J | jnl |
PeerJ Comput. Sci.
|
| 2024 | J | jnl |
Comput. Secur.
|
| 2024 | J | jnl |
Netw. Secur.
|
| 2024 | J | jnl |
BMC Medical Informatics Decis. Mak.
|
| 2024 | J | jnl |
Multim. Tools Appl.
|
| 2023 | J | jnl |
Intell. Autom. Soft Comput.
|
| 2023 | J | jnl |
A neutrosophic AHP-based computational technique for security management in a fog computing network.
J. Supercomput.
|
| 2023 | J | jnl |
Int. J. Fuzzy Log. Intell. Syst.
|
| 2023 | — | conf |
IC3I
|
| 2023 | J | jnl |
Comput. Syst. Sci. Eng.
|
| 2023 | J | jnl |
Int. J. Inf. Sec.
|
| 2023 | — | conf |
IC3I
|
| 2022 | J | jnl |
Comput. Syst. Sci. Eng.
|
| 2022 | J | jnl |
Intell. Autom. Soft Comput.
|
| 2022 | J | jnl |
Intell. Autom. Soft Comput.
|
| 2022 | J | jnl |
Comput. Syst. Sci. Eng.
|
| 2022 | J | jnl |
Comput. Syst. Sci. Eng.
|
| 2022 | J | jnl |
EAI Endorsed Trans. Scalable Inf. Syst.
|
| 2022 | J | jnl |
J. King Saud Univ. Comput. Inf. Sci.
|
| 2022 | J | jnl |
Comput. Syst. Sci. Eng.
|
| 2022 | J | jnl |
Int. J. Appl. Metaheuristic Comput.
|
| 2022 | J | jnl |
Intell. Autom. Soft Comput.
|
| 2022 | J | jnl |
J. King Saud Univ. Comput. Inf. Sci.
|
| 2022 | J | jnl |
J. King Saud Univ. Comput. Inf. Sci.
|
| 2021 | J | jnl |
KSII Trans. Internet Inf. Syst.
|
| 2021 | J | jnl |
IEEE Access
|
| 2021 | J | jnl |
Comput. Syst. Sci. Eng.
|
| 2021 | J | jnl |
Secur. Priv.
|
| 2021 | J | jnl |
Comput. Syst. Sci. Eng.
|
| 2021 | J | jnl |
Intell. Autom. Soft Comput.
|
| 2021 | J | jnl |
Intell. Autom. Soft Comput.
|
| 2021 | J | jnl |
Symmetry
|
| 2021 | J | jnl |
IEEE Access
|
| 2021 | J | jnl |
Intell. Autom. Soft Comput.
|
| 2021 | J | jnl |
Intell. Autom. Soft Comput.
|
| 2021 | J | jnl |
Comput. Syst. Sci. Eng.
|
| 2021 | J | jnl |
Intell. Autom. Soft Comput.
|
| 2021 | J | jnl |
Intell. Autom. Soft Comput.
|
| 2021 | J | jnl |
Int. J. Syst. Dyn. Appl.
|
| 2020 | J | jnl |
IEEE Access
|
| 2020 | J | jnl |
IEEE Access
|
| 2020 | J | jnl |
Symmetry
|
| 2020 | J | jnl |
IEEE Access
|
| 2020 | J | jnl |
PeerJ Comput. Sci.
|
| 2020 | J | jnl |
Symmetry
|
| 2020 | J | jnl |
IEEE Access
|
| 2020 | J | jnl |
Evaluating the Impact of Blockchain Models for Secure and Trustworthy Electronic Healthcare Records.
IEEE Access
|
| 2020 | J | jnl |
IEEE Access
|
| 2020 | J | jnl |
Symmetry
|
| 2020 | J | jnl |
IEEE Access
|
| 2020 | — | conf |
ICCCNT
|
| 2020 | J | jnl |
Int. J. Wirel. Inf. Networks
|
| 2020 | J | jnl |
Software Security Estimation Using the Hybrid Fuzzy ANP-TOPSIS Approach: Design Tactics Perspective.
Symmetry
|
| 2020 | J | jnl |
Symmetry
|
| 2019 | J | jnl |
Iran J. Comput. Sci.
|
| 2019 | J | jnl |
EAI Endorsed Trans. Scalable Inf. Syst.
|
| 2019 | J | jnl |
First Monday
|
| 2019 | J | jnl |
Int. J. Comput. Intell. Syst.
|
| 2019 | J | jnl |
IEEE Access
|
| 2019 | J | jnl |
PeerJ Comput. Sci.
|
| 2018 | J | jnl |
Int. J. Appl. Evol. Comput.
|
| 2018 | — | conf |
RICE
|
| 2016 | — | conf |
ICACDS
|
| 2015 | — | conf |
SCSE
|
| 2014 | — | conf |
FICTA (2)
|
| 2012 | J | jnl |
ACM SIGSOFT Softw. Eng. Notes
|
| 2011 | J | jnl |
ACM SIGSOFT Softw. Eng. Notes
|
| 2010 | J | jnl |
CoRR
|
| 2010 | — | conf |
IC3 (1)
|
| 2009 | B | conf |
ARES
|
| 2009 | J | jnl |
ACM SIGSOFT Softw. Eng. Notes
|
| 2009 | J | jnl |
ACM SIGSOFT Softw. Eng. Notes
|
| 2009 | — | conf |
ITNG
|
| 2009 | — | conf |
ICISTM
|
| 2008 | — | conf |
CSREA EEE
|
| 2007 | J | jnl |
J. King Saud Univ. Comput. Inf. Sci.
|
| 2005 | — | conf |
ACIS-ICIS
|
| 2004 | — | conf |
VVEIS
|