| Year | Rank | Type | Title / Venue / Authors |
|---|---|---|---|
| 2009 | — | conf |
Data Mining, Intrusion Detection, Information Security and Assurance, and Data Networks Security
|
| 2009 | C | conf |
FUSION
|
| 2008 | — | conf |
Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security
|
| 2008 | — | conf |
ISDA (1)
|
| 2008 | — | conf |
Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security
|
| 2007 | — | conf |
Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security
|
| 2006 | — | conf |
Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security
|
| 2006 | C | conf |
FUSION
|
| 2005 | B | conf |
SMC
|
| 2005 | — | conf |
Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security
|
| 2004 | — | conf |
SMC (2)
|
| 2003 | J | jnl |
IEEE Trans. Syst. Man Cybern. Part B
|
| 2003 | B | conf |
SMC
|
| 2003 | J | jnl |
Inf. Fusion
|
| 2002 | Misc | conf |
ICASSP
|
| 2001 | B | conf |
SMC
|
| 2000 | B | conf |
SMC
|
| 1999 | Misc | conf |
ICASSP
|
| 1999 | J | jnl |
IEEE Trans. Signal Process.
|
| 1996 | Misc | conf |
ICASSP
|