| Year | Rank | Type | Title / Venue / Authors |
|---|---|---|---|
| 2026 | J | jnl |
CoRR
|
| 2026 | J | jnl |
Expert Syst. Appl.
|
| 2026 | — | ed. |
ICISSP (1)
|
| 2026 | — | ed. |
ICISSP (2)
|
| 2026 | J | jnl |
Comput. Networks
|
| 2025 | J | jnl |
Comput. Networks
|
| 2025 | J | jnl |
Comput. Sci. Rev.
|
| 2025 | — | ed. |
CANS (1)
|
| 2025 | — | ed. |
CANS (2)
|
| 2025 | J | jnl |
Commun. ACM
|
| 2025 | — | conf |
BCCA
|
| 2025 | J | jnl |
ACM Trans. Cyber Phys. Syst.
|
| 2025 | — | conf |
WebSci
|
| 2025 | — | conf |
CNS
|
| 2025 | J | jnl |
CoRR
|
| 2025 | J | jnl |
ACM Trans. Multim. Comput. Commun. Appl.
|
| 2025 | J | jnl |
IEEE Access
|
| 2025 | B | ed. |
NSS
|
| 2025 | A | conf |
AsiaCCS
|
| 2025 | J | jnl |
CoRR
|
| 2025 | — | ed. |
ICISSP (1)
|
| 2025 | — | ed. |
ICISSP (2)
|
| 2025 | — | conf |
DSN-S
|
| 2025 | C | conf |
ICBC
|
| 2025 | J | jnl |
CoRR
|
| 2025 | — | conf |
ICAIF
|
| 2025 | J | jnl |
IEEE Access
|
| 2025 | — | conf |
ESORICS (3)
|
| 2025 | J | jnl |
CoRR
|
| 2025 | J | jnl |
IEEE Access
|
| 2024 | J | jnl |
IEEE Commun. Surv. Tutorials
|
| 2024 | J | jnl |
CoRR
|
| 2024 | J | jnl |
Comput. Commun.
|
| 2024 | J | jnl |
Expert Syst. Appl.
|
| 2024 | — | conf |
DAPPS
|
| 2024 | J | jnl |
CoRR
|
| 2024 | J | jnl |
IEEE Trans. Dependable Secur. Comput.
|
| 2024 | — | conf |
ESORICS (1)
|
| 2024 | J | jnl |
Comput. Secur.
|
| 2024 | — | book |
|
| 2024 | B | conf |
NSS
|
| 2023 | J | jnl |
IEEE Internet Things J.
|
| 2023 | C | conf |
ICBC
|
| 2023 | J | jnl |
CoRR
|
| 2023 | B | conf |
ICCCN
|
| 2023 | J | jnl |
Comput. Commun.
|
| 2023 | J | jnl |
IEEE Access
|
| 2023 | J | jnl |
CoRR
|
| 2023 | J | jnl |
CoRR
|
| 2023 | J | jnl |
Comput. Networks
|
| 2023 | J | jnl |
CoRR
|
| 2023 | J | jnl |
LENTO: Unpredictable Latency-based continuous authEntication for Network inTensive IoT envirOnments.
Future Gener. Comput. Syst.
|
| 2023 | C | conf |
ICBC
|
| 2023 | A | conf |
ACSAC
|
| 2023 | — | conf |
WISEC
|
| 2023 | J | jnl |
IEEE Trans. Inf. Forensics Secur.
|
| 2023 | J | jnl |
IEEE Trans. Dependable Secur. Comput.
|
| 2023 | C | conf |
ISCC
|
| 2023 | J | jnl |
IEEE Access
|
| 2023 | C | conf |
ISNCC
|
| 2023 | J | jnl |
IEEE Trans. Dependable Secur. Comput.
|
| 2023 | C | conf |
ISCC
|
| 2023 | — | conf |
IDSTA
|
| 2023 | — | conf |
DAPPS
|
| 2023 | A | conf |
FC
|
| 2022 | J | jnl |
CoRR
|
| 2022 | — | conf |
Blockchain
|
| 2022 | J | jnl |
CoRR
|
| 2022 | J | jnl |
IEEE Trans. Dependable Secur. Comput.
|
| 2022 | J | jnl |
IET Inf. Secur.
|
| 2022 | J | jnl |
IEEE Access
|
| 2022 | J | jnl |
CoRR
|
| 2022 | — | ed. |
ESORICS (1)
|
| 2022 | — | ed. |
ESORICS (2)
|
| 2022 | — | ed. |
ESORICS (3)
|
| 2022 | J | jnl |
CoRR
|
| 2022 | — | ed. |
EICC 2022: European Interdisciplinary Cybersecurity Conference, Barcelona, Spain, June 15 - 16, 2022
EICC
|
| 2022 | — | conf |
CNS
|
| 2022 | C | conf |
ICICS
|
| 2022 | C | conf |
ICICS
|
| 2022 | J | jnl |
ACM Trans. Web
|
| 2022 | J | jnl |
Comput. Networks
|
| 2022 | J | jnl |
Sensors
|
| 2022 | — | conf |
WISEC
|
| 2022 | C | conf |
SecureComm
|
| 2022 | J | jnl |
CoRR
|
| 2022 | J | jnl |
Future Gener. Comput. Syst.
|
| 2022 | J | jnl |
IEEE Secur. Priv.
|
| 2022 | J | jnl |
IEEE Secur. Priv.
|
| 2022 | J | jnl |
CoRR
|
| 2022 | J | jnl |
Comput. Networks
|
| 2022 | C | conf |
SACMAT
|
| 2022 | J | jnl |
J. Cloud Comput.
|
| 2021 | J | jnl |
CoRR
|
| 2021 | A | conf |
ACSAC
|
| 2021 | — | conf |
Blockchain
|
| 2021 | — | conf |
Beyond SolarWinds: The Systemic Risks of Critical Infrastructures, State of Play, Future Directions.
ITASEC
|
| 2021 | J | jnl |
Comput. Commun.
|
| 2021 | J | jnl |
Commun. ACM
|
| 2021 | J | jnl |
Future Gener. Comput. Syst.
|
| 2021 | J | jnl |
ACM Comput. Surv.
|
| 2021 | J | jnl |
IoTrace: A Flexible, Efficient, and Privacy-Preserving IoT-Enabled Architecture for Contact Tracing.
IEEE Commun. Mag.
|
| 2021 | J | jnl |
ACM Trans. Embed. Comput. Syst.
|
| 2021 | — | conf |
TPS-ISA
|
| 2021 | — | conf |
CNS
|
| 2021 | — | conf |
ISPA/BDCloud/SocialCom/SustainCom
|
| 2021 | — | book |
|
| 2021 | J | jnl |
IEEE Internet Things J.
|
| 2021 | J | jnl |
ACM Trans. Knowl. Discov. Data
|
| 2021 | J | jnl |
CoRR
|
| 2021 | J | jnl |
J. Netw. Comput. Appl.
|
| 2021 | C | ed. |
SACMAT
|
| 2021 | J | jnl |
IEEE Trans. Dependable Secur. Comput.
|
| 2021 | J | jnl |
CoRR
|
| 2021 | — | ed. |
SpaCCS
|
| 2021 | — | ed. |
SpaCCS Workshops
|
| 2021 | J | jnl |
CoRR
|
| 2021 | J | jnl |
IEEE Commun. Surv. Tutorials
|
| 2020 | J | jnl |
IEEE Trans. Dependable Secur. Comput.
|
| 2020 | J | jnl |
IEEE Access
|
| 2020 | A* | conf |
IJCAI
|
| 2020 | J | jnl |
CoRR
|
| 2020 | J | jnl |
IEEE Access
|
| 2020 | — | conf |
WISEC
|
| 2020 | J | jnl |
Comput. Commun.
|
| 2020 | J | jnl |
CoRR
|
| 2020 | J | jnl |
CoRR
|
| 2020 | — | conf |
WISEC
|
| 2020 | J | jnl |
IoTrace: A Flexible, Efficient, and Privacy-Preserving IoT-enabled Architecture for Contact Tracing.
CoRR
|
| 2020 | J | jnl |
IEEE Access
|
| 2020 | J | jnl |
IEEE Internet Things J.
|
| 2020 | J | jnl |
CoRR
|
| 2020 | C | conf |
CRiSIS
|
| 2020 | J | jnl |
CoRR
|
| 2020 | J | jnl |
CoRR
|
| 2020 | J | jnl |
PiNcH: An effective, efficient, and robust solution to drone detection via network traffic analysis.
Comput. Networks
|
| 2020 | — | conf |
CNS
|
| 2020 | J | jnl |
IEEE Commun. Surv. Tutorials
|
| 2020 | J | jnl |
CoRR
|
| 2020 | J | jnl |
CoRR
|
| 2020 | J | jnl |
CoRR
|
| 2020 | J | jnl |
IEEE Commun. Mag.
|
| 2020 | J | jnl |
CoRR
|
| 2019 | J | jnl |
IEEE Access
|
| 2019 | J | jnl |
CoRR
|
| 2019 | J | jnl |
CoRR
|
| 2019 | — | conf |
CNS
|
| 2019 | — | conf |
WiseML@WiSec
|
| 2019 | — | conf |
Drive me not: GPS spoofing detection via cellular network: (architectures, models, and experiments).
WiSec
|
| 2019 | J | jnl |
Comput. Commun.
|
| 2019 | — | conf |
EDGE
|
| 2019 | J | jnl |
Secur. Commun. Networks
|
| 2019 | J | jnl |
CoRR
|
| 2019 | — | conf |
CNS
|
| 2019 | — | conf |
EDGE
|
| 2019 | — | conf |
CNS
|
| 2019 | — | conf |
SecureComm (1)
|
| 2019 | C | conf |
ICISSP
|
| 2019 | — | conf |
ICISSP (Revised Selected Papers)
|
| 2019 | J | jnl |
CoRR
|
| 2019 | Misc | conf |
SAC
|
| 2019 | B | conf |
DSAA
|
| 2019 | J | jnl |
CoRR
|
| 2018 | — | conf |
STM
|
| 2018 | J | jnl |
CoRR
|
| 2018 | C | conf |
SACMAT
|
| 2018 | B | conf |
SERVICES
|
| 2018 | J | jnl |
CoRR
|
| 2018 | J | jnl |
Comput. Commun.
|
| 2018 | J | jnl |
J. Netw. Comput. Appl.
|
| 2018 | — | conf |
ISSA/CSITS@ESORICS
|
| 2018 | — | conf |
CNS
|
| 2018 | — | conf |
SpaCCS
|
| 2018 | J | jnl |
CoRR
|
| 2018 | — | conf |
CNS
|
| 2018 | J | jnl |
IEEE Trans. Dependable Secur. Comput.
|
| 2018 | J | jnl |
Sensors
|
| 2018 | — | conf |
From Database to Cyber Security
|
| 2018 | J | jnl |
CoRR
|
| 2017 | — | conf |
ICC
|
| 2017 | — | conf |
EUSPN/ICTH
|
| 2017 | J | jnl |
Comput. Networks
|
| 2017 | J | jnl |
J. Netw. Comput. Appl.
|
| 2017 | B | conf |
DSAA
|
| 2017 | Misc | conf |
SEC
|
| 2017 | C | conf |
SECRYPT
|
| 2017 | J | jnl |
CoRR
|
| 2017 | — | conf |
WWW (Companion Volume)
|
| 2017 | J | jnl |
CoRR
|
| 2016 | J | jnl |
IEEE Trans. Mob. Comput.
|
| 2016 | J | jnl |
ACM Trans. Embed. Comput. Syst.
|
| 2016 | J | jnl |
Comput. Commun.
|
| 2016 | J | jnl |
IEEE Intell. Syst.
|
| 2016 | J | jnl |
CoRR
|
| 2016 | J | jnl |
IEEE Trans. Dependable Secur. Comput.
|
| 2016 | J | jnl |
CoRR
|
| 2016 | C | conf |
ISCC
|
| 2016 | J | jnl |
Comput. Commun.
|
| 2016 | J | jnl |
Comput. Networks
|
| 2016 | J | jnl |
ERCIM News
|
| 2016 | J | jnl |
IEEE Cloud Comput.
|
| 2015 | J | jnl |
Future Gener. Comput. Syst.
|
| 2015 | J | jnl |
CoRR
|
| 2015 | J | jnl |
Comput. Networks
|
| 2015 | J | jnl |
Expert Syst. Appl.
|
| 2015 | J | jnl |
Decis. Support Syst.
|
| 2015 | J | jnl |
CoRR
|
| 2015 | — | conf |
WISEC
|
| 2015 | — | ch. |
Advanced Research in Data Privacy
|
| 2015 | J | jnl |
IEEE Trans. Serv. Comput.
|
| 2015 | J | jnl |
ACM Trans. Inf. Syst. Secur.
|
| 2015 | J | jnl |
Digit. Investig.
|
| 2015 | B | conf |
TrustBus
|
| 2015 | Misc | conf |
SAC
|
| 2014 | — | conf |
ICDCS Workshops
|
| 2014 | — | conf |
WISE (1)
|
| 2014 | — | conf |
CNS
|
| 2014 | J | jnl |
Future Gener. Comput. Syst.
|
| 2014 | J | jnl |
J. Comput. Syst. Sci.
|
| 2014 | J | jnl |
ERCIM News
|
| 2014 | C | conf |
SECRYPT
|
| 2014 | — | conf |
ICETE (Selected Papers)
|
| 2014 | J | jnl |
Comput. Commun.
|
| 2014 | J | jnl |
IEEE Commun. Mag.
|
| 2014 | J | jnl |
Computer
|
| 2013 | J | jnl |
IEEE Syst. J.
|
| 2013 | — | conf |
UIC/ATC
|
| 2013 | J | jnl |
IEEE Trans. Inf. Forensics Secur.
|
| 2013 | C | conf |
CRiSIS
|
| 2013 | J | jnl |
CoRR
|
| 2013 | — | conf |
FPS
|
| 2013 | C | conf |
WOWMOM
|
| 2013 | — | ed. |
DPM/SETOP
|
| 2013 | A* | conf |
INFOCOM
|
| 2013 | J | jnl |
Pervasive Mob. Comput.
|
| 2013 | J | jnl |
IEEE Netw.
|
| 2013 | C | conf |
CRiSIS
|
| 2013 | J | jnl |
CoRR
|
| 2013 | J | jnl |
Telecommun. Syst.
|
| 2013 | C | ed. |
SecureComm
|
| 2013 | — | ch. |
Mobile Ad Hoc Networking
|
| 2013 | J | jnl |
CoRR
|
| 2013 | J | jnl |
Comput. Networks
|
| 2013 | C | conf |
WOWMOM
|
| 2013 | C | conf |
CRiSIS
|
| 2013 | J | jnl |
IEEE Trans. Mob. Comput.
|
| 2013 | J | jnl |
J. Netw. Comput. Appl.
|
| 2012 | J | jnl |
Comput. Secur.
|
| 2012 | A | conf |
AsiaCCS
|
| 2012 | B | conf |
SRDS
|
| 2012 | A | conf |
Privacy Enhancing Technologies
|
| 2012 | Misc | conf |
ICDCN
|
| 2012 | — | ed. |
WISEC
|
| 2012 | B | conf |
SRDS
|
| 2012 | J | jnl |
ACM Trans. Sens. Networks
|
| 2012 | — | conf |
Security Protocols Workshop
|
| 2012 | J | jnl |
IEEE Trans. Knowl. Data Eng.
|
| 2012 | Misc | conf |
ICDCN
|
| 2011 | J | jnl |
EURASIP J. Wirel. Commun. Netw.
|
| 2011 | J | jnl |
Decis. Support Syst.
|
| 2011 | J | jnl |
J. Netw. Comput. Appl.
|
| 2011 | J | jnl |
Int. J. Inf. Sec.
|
| 2011 | J | jnl |
Digit. Investig.
|
| 2011 | J | jnl |
IEEE Trans. Dependable Secur. Comput.
|
| 2011 | — | conf |
WISEC
|
| 2011 | C | conf |
WOWMOM
|
| 2011 | C | conf |
WOWMOM
|
| 2011 | J | jnl |
Pervasive Mob. Comput.
|
| 2011 | J | jnl |
Comput. Commun.
|
| 2011 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2011 | J | jnl |
ACM Trans. Inf. Syst. Secur.
|
| 2011 | J | jnl |
Secur. Commun. Networks
|
| 2011 | J | jnl |
J. Netw. Comput. Appl.
|
| 2011 | — | conf |
eCrime Researchers Summit
|
| 2010 | C | conf |
CIT
|
| 2010 | Misc | conf |
SAC
|
| 2010 | C | conf |
SecureComm
|
| 2010 | J | jnl |
CoRR
|
| 2010 | B | conf |
SRDS
|
| 2010 | C | conf |
ICICS
|
| 2010 | J | jnl |
Inf. Process. Lett.
|
| 2010 | B | conf |
DBSec
|
| 2010 | — | conf |
iNetSec
|
| 2010 | J | jnl |
J. Comput. Secur.
|
| 2010 | A* | conf |
INFOCOM
|
| 2010 | Misc | conf |
SEC
|
| 2010 | C | conf |
CIT
|
| 2010 | B | conf |
SRDS
|
| 2010 | C | conf |
CIT
|
| 2010 | J | jnl |
Comput. Secur.
|
| 2010 | — | conf |
MOBIWAC
|
| 2010 | C | conf |
ICICS
|
| 2010 | Misc | conf |
SAC
|
| 2010 | J | jnl |
Secur. Commun. Networks
|
| 2009 | Misc | conf |
SEC
|
| 2009 | C | conf |
SACMAT
|
| 2009 | — | conf |
WISEC
|
| 2009 | J | jnl |
Secur. Commun. Networks
|
| 2009 | J | jnl |
IEEE Trans. Computers
|
| 2009 | J | jnl |
Inf. Fusion
|
| 2009 | Misc | conf |
SAC
|
| 2009 | Misc | conf |
SEC
|
| 2009 | J | jnl |
EURASIP J. Wirel. Commun. Netw.
|
| 2009 | J | jnl |
Ad Hoc Networks
|
| 2009 | J | jnl |
Secur. Commun. Networks
|
| 2009 | C | conf |
SecureComm
|
| 2009 | — | conf |
WWIC
|
| 2009 | J | jnl |
CoRR
|
| 2008 | B | conf |
A Linear-Time Multivariate Micro-aggregation for Privacy Protection in Uniform Very Large Data Sets.
MDAI
|
| 2008 | Misc | conf |
SEC
|
| 2008 | Misc | conf |
SAC
|
| 2008 | J | jnl |
Comput. Commun.
|
| 2008 | J | jnl |
CoRR
|
| 2008 | A* | conf |
PerCom
|
| 2008 | — | conf |
WISEC
|
| 2008 | A* | conf |
PODC
|
| 2008 | C | conf |
IAS
|
| 2008 | Misc | conf |
SEC
|
| 2008 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2008 | J | jnl |
Int. J. Satell. Commun. Netw.
|
| 2008 | C | conf |
SecureComm
|
| 2008 | B | conf |
SRDS
|
| 2008 | — | conf |
WISEC
|
| 2008 | J | jnl |
ACM Trans. Inf. Syst. Secur.
|
| 2008 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2008 | C | conf |
SecureComm
|
| 2007 | B | conf |
MobiHoc
|
| 2007 | J | jnl |
Ad Hoc Networks
|
| 2007 | A | conf |
ESORICS
|
| 2007 | — | conf |
VTC Spring
|
| 2007 | — | conf |
PerCom Workshops
|
| 2007 | J | jnl |
J. Comput. Secur.
|
| 2007 | B | conf |
MASS
|
| 2007 | A | conf |
IPDPS
|
| 2007 | B | conf |
MASS
|
| 2006 | A | conf |
IPDPS
|
| 2006 | A | conf |
AsiaCCS
|
| 2006 | — | conf |
WCAN@ICALP
|
| 2006 | J | jnl |
Wirel. Networks
|
| 2006 | B | conf |
SMC
|
| 2006 | — | conf |
PerCom Workshops
|
| 2006 | C | conf |
SecureComm
|
| 2005 | — | conf |
ICMB
|
| 2005 | — | conf |
HOT-P2P
|
| 2005 | C | conf |
SecureComm
|
| 2005 | C | conf |
SecureComm
|
| 2004 | — | conf |
HOT-P2P
|
| 2004 | — | conf |
SASN
|
| 2004 | — | conf |
WONS
|
| 2004 | A | conf |
IPDPS
|
| 2004 | J | jnl |
J. Comput. Secur.
|
| 2004 | — | — |
|
| 2003 | B | conf |
SRDS
|
| 2003 | Misc | conf |
SEC
|
| 2003 | — | conf |
ICPP Workshops
|
| 2003 | J | jnl |
Ad Hoc Networks
|
| 2003 | — | conf |
SASN
|
| 2003 | J | jnl |
Commun. ACM
|
| 2002 | — | conf |
POMC
|
| 2002 | — | conf |
FASec
|
| 2002 | Misc | conf |
SEC
|