| Year | Rank | Type | Title / Venue / Authors |
|---|---|---|---|
| 2025 | J | jnl |
CoRR
|
| 2025 | — | conf |
ICMCIS
|
| 2025 | J | jnl |
CoRR
|
| 2024 | J | jnl |
Inf. Comput. Secur.
|
| 2022 | J | jnl |
Comput. Secur.
|
| 2022 | J | jnl |
Future Internet
|
| 2022 | — | conf |
ISSRE Workshops
|
| 2021 | J | jnl |
Comput. Secur.
|
| 2021 | — | conf |
CyberICPS/SECPRE/ADIoT/SPOSE/CPS4CIP/CDT&SECOMANE@ESORICS
|
| 2021 | C | conf |
CRITIS
|
| 2021 | J | jnl |
Inf. Comput. Secur.
|
| 2020 | — | conf |
GraMSec
|
| 2020 | J | jnl |
CoRR
|
| 2020 | J | jnl |
Future Internet
|
| 2020 | — | conf |
CyberICPS/SECPRE/ADIoT@ESORICS
|
| 2020 | J | jnl |
CoRR
|
| 2020 | A | conf |
SIGCSE
|
| 2019 | J | jnl |
Inf. Comput. Secur.
|
| 2019 | J | jnl |
J. Syst. Softw.
|
| 2019 | — | conf |
CyberICPS/SECPRE/SPOSE/ADIoT@ESORICS
|
| 2019 | J | jnl |
Comput. Secur.
|
| 2019 | A | conf |
RE
|
| 2018 | — | ed. |
ESPRE@RE
|
| 2018 | — | conf |
ESPRE@RE
|
| 2018 | — | book |
|
| 2018 | — | conf |
Privacy and Identity Management
|
| 2018 | — | conf |
HAISA
|
| 2018 | — | conf |
ICSE (SEET)
|
| 2018 | — | conf |
SoSE
|
| 2018 | — | conf |
ESPRE@RE
|
| 2017 | — | conf |
BCS HCI
|
| 2017 | — | conf |
RE Workshops
|
| 2017 | A | conf |
SOUPS
|
| 2017 | — | conf |
RE Workshops
|
| 2017 | J | jnl |
Comput. Secur.
|
| 2017 | B | conf |
RCIS
|
| 2017 | B | conf |
RCIS
|
| 2017 | — | conf |
CSEE&T
|
| 2016 | — | conf |
BCS HCI
|
| 2016 | J | jnl |
Requir. Eng.
|
| 2016 | — | ed. |
BCS HCI
|
| 2016 | — | conf |
BCS HCI
|
| 2016 | — | conf |
BCS HCI
|
| 2016 | — | conf |
MobiCASE
|
| 2016 | — | conf |
BCS HCI
|
| 2016 | — | conf |
The Application of useless Japanese Inventions for Requirements Elicitation in Information Security.
BCS HCI
|
| 2016 | — | conf |
RE Workshops
|
| 2015 | C | conf |
CRITIS
|
| 2015 | — | conf |
HAISA
|
| 2015 | J | jnl |
Inf. Comput. Secur.
|
| 2015 | — | conf |
HAISA
|
| 2015 | — | conf |
CIT/IUCC/DASC/PICom
|
| 2015 | J | jnl |
Softw. Qual. J.
|
| 2015 | — | conf |
BCS HCI
|
| 2014 | — | conf |
BCS HCI
|
| 2014 | — | conf |
SSE@SIGSOFT FSE
|
| 2014 | — | conf |
HAISA
|
| 2014 | — | ch. |
Cyberpatterns
|
| 2014 | — | ed. |
ESPRE
|
| 2013 | — | conf |
Haifa Verification Conference
|
| 2013 | — | conf |
CHI Extended Abstracts
|
| 2013 | Misc | conf |
SAC
|
| 2013 | — | conf |
TRUST
|
| 2013 | Misc | conf |
EICS
|
| 2013 | — | conf |
MobiCASE
|
| 2013 | — | ed. |
WASH
|
| 2012 | — | conf |
POLICY
|
| 2012 | — | conf |
MDsec@MoDELS
|
| 2012 | C | conf |
DAIS
|
| 2012 | — | conf |
EuroPKI
|
| 2012 | — | conf |
HCSE
|
| 2012 | — | conf |
WWW (Companion Volume)
|
| 2011 | — | — |
|
| 2011 | — | conf |
iStar
|
| 2011 | J | jnl |
Int. J. Secur. Softw. Eng.
|
| 2011 | A | conf |
RE
|
| 2011 | B | conf |
ARES
|
| 2011 | A* | conf |
CHI
|
| 2011 | B | conf |
ARES
|
| 2010 | — | conf |
SAISMC
|
| 2010 | — | conf |
SESS@ICSE
|
| 2010 | B | conf |
ARES
|
| 2010 | — | conf |
BCS HCI
|
| 2010 | J | jnl |
Inf. Manag. Comput. Secur.
|
| 2010 | — | conf |
HCSE
|
| 2010 | C | conf |
NSPW
|
| 2010 | J | jnl |
Int. J. Secur. Softw. Eng.
|
| 2009 | A | conf |
RE
|
| 2008 | — | conf |
REET
|