| Year | Rank | Type | Title / Venue / Authors |
|---|---|---|---|
| 2026 | — | conf |
ICISSP (1)
|
| 2025 | — | conf |
VTC2025-Spring
|
| 2025 | J | jnl |
Future Gener. Comput. Syst.
|
| 2025 | J | jnl |
Comput. Electron. Agric.
|
| 2025 | J | jnl |
CoRR
|
| 2025 | J | jnl |
CoRR
|
| 2024 | J | jnl |
Comput. Secur.
|
| 2024 | J | jnl |
CoRR
|
| 2024 | J | jnl |
Comput. Electron. Agric.
|
| 2024 | — | conf |
Users' Scenario-Base for Analysing Insider Threat Detection Based on User's Downloads Activity Logs.
FICC (2)
|
| 2023 | — | ch. |
Emerging Trends in Cybersecurity Applications
|
| 2023 | J | jnl |
IEEE Trans. Ind. Informatics
|
| 2023 | J | jnl |
Sensors
|
| 2022 | J | jnl |
CoRR
|
| 2022 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2022 | J | jnl |
CoRR
|
| 2022 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2022 | J | jnl |
CoRR
|
| 2022 | J | jnl |
IEEE Access
|
| 2022 | J | jnl |
CoRR
|
| 2022 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2022 | — | conf |
ICR
|
| 2022 | J | jnl |
IEEE Access
|
| 2022 | J | jnl |
Future Internet
|
| 2021 | J | jnl |
IEEE Commun. Surv. Tutorials
|
| 2021 | — | conf |
PerCom Workshops
|
| 2020 | J | jnl |
CoRR
|
| 2020 | J | jnl |
CoRR
|
| 2019 | J | jnl |
Int. J. Intell. Inf. Technol.
|
| 2018 | — | conf |
SecureComm (2)
|
| 2018 | — | conf |
SecureComm (2)
|
| 2018 | — | conf |
FNSS
|
| 2017 | — | conf |
LCN Workshops
|
| 2017 | — | conf |
ATCS/SePrIoT@SecureComm
|
| 2017 | — | conf |
ATCS/SePrIoT@SecureComm
|
| 2017 | — | conf |
ATCS/SePrIoT@SecureComm
|
| 2017 | Misc | conf |
IVCNZ
|
| 2017 | J | jnl |
Concurr. Comput. Pract. Exp.
|
| 2017 | — | conf |
ATCS/SePrIoT@SecureComm
|
| 2016 | J | jnl |
Inf. Secur. J. A Glob. Perspect.
|
| 2016 | C | conf |
SecureComm
|
| 2016 | — | conf |
ICONIP (2)
|
| 2016 | — | conf |
SETN
|
| 2016 | B | conf |
FUZZ-IEEE
|
| 2016 | Misc | conf |
IVCNZ
|
| 2016 | C | conf |
SecureComm
|
| 2015 | C | conf |
SecureComm
|
| 2015 | C | conf |
SecureComm
|