| Year | Rank | Type | Title / Venue / Authors |
|---|---|---|---|
| 2026 | J | jnl |
Inf.
|
| 2025 | J | jnl |
AI Soc.
|
| 2024 | J | jnl |
IEEE Internet Things Mag.
|
| 2024 | J | jnl |
Netw. Secur.
|
| 2023 | J | jnl |
Intell. Autom. Soft Comput.
|
| 2023 | J | jnl |
A neutrosophic AHP-based computational technique for security management in a fog computing network.
J. Supercomput.
|
| 2023 | J | jnl |
Inf.
|
| 2022 | J | jnl |
Intell. Autom. Soft Comput.
|
| 2022 | J | jnl |
Intell. Autom. Soft Comput.
|
| 2022 | J | jnl |
Comput. Syst. Sci. Eng.
|
| 2022 | J | jnl |
Intell. Autom. Soft Comput.
|
| 2022 | J | jnl |
Comput. Syst. Sci. Eng.
|
| 2022 | J | jnl |
J. King Saud Univ. Comput. Inf. Sci.
|
| 2022 | J | jnl |
Health Informatics J.
|
| 2021 | J | jnl |
KSII Trans. Internet Inf. Syst.
|
| 2021 | J | jnl |
IEEE Access
|
| 2021 | J | jnl |
Intell. Autom. Soft Comput.
|
| 2021 | J | jnl |
Intell. Autom. Soft Comput.
|
| 2021 | J | jnl |
IEEE Access
|
| 2021 | J | jnl |
Comput. Syst. Sci. Eng.
|
| 2021 | J | jnl |
Intell. Autom. Soft Comput.
|
| 2021 | J | jnl |
Intell. Autom. Soft Comput.
|
| 2021 | J | jnl |
Int. J. Syst. Dyn. Appl.
|
| 2020 | J | jnl |
IEEE Access
|
| 2020 | J | jnl |
IEEE Access
|
| 2020 | J | jnl |
Symmetry
|
| 2020 | J | jnl |
IEEE Access
|
| 2020 | J | jnl |
PeerJ Comput. Sci.
|
| 2020 | J | jnl |
Symmetry
|
| 2020 | J | jnl |
IEEE Access
|
| 2020 | J | jnl |
Evaluating the Impact of Blockchain Models for Secure and Trustworthy Electronic Healthcare Records.
IEEE Access
|
| 2020 | J | jnl |
IEEE Access
|
| 2020 | J | jnl |
Symmetry
|
| 2020 | J | jnl |
Symmetry
|
| 2020 | J | jnl |
IEEE Access
|
| 2020 | J | jnl |
Software Security Estimation Using the Hybrid Fuzzy ANP-TOPSIS Approach: Design Tactics Perspective.
Symmetry
|
| 2019 | J | jnl |
Int. J. Comput. Intell. Syst.
|
| 2019 | J | jnl |
IEEE Access
|
| 2019 | J | jnl |
PeerJ Comput. Sci.
|