| Year | Rank | Type | Title / Venue / Authors |
|---|---|---|---|
| 2009 | — | conf |
Data Mining, Intrusion Detection, Information Security and Assurance, and Data Networks Security
|
| 2009 | — | conf |
Data Mining, Intrusion Detection, Information Security and Assurance, and Data Networks Security
|
| 2008 | — | conf |
Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security
|
| 2007 | — | conf |
Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security
|
| 2007 | — | conf |
Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security
|
| 2006 | J | jnl |
IEEE Secur. Priv.
|
| 2006 | — | conf |
Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security
|
| 2005 | — | conf |
Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security
|
| 2005 | — | conf |
Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security
|
| 2003 | C | conf |
HIS
|
| 2003 | J | jnl |
Presence Teleoperators Virtual Environ.
|
| 2003 | J | jnl |
Presence Teleoperators Virtual Environ.
|
| 2003 | J | jnl |
Presence Teleoperators Virtual Environ.
|
| 2001 | J | jnl |
IEEE Computer Graphics and Applications
|
| 2001 | J | jnl |
ACM Trans. Model. Comput. Simul.
|
| 1999 | Misc | conf |
FLAIRS
|
| 1999 | Misc | conf |
FLAIRS
|
| 1998 | J | jnl |
Presence Teleoperators Virtual Environ.
|
| 1998 | — | conf |
Agents
|
| 1998 | — | conf |
Canadian AI
|
| 1997 | B | conf |
ICTAI
|
| 1997 | — | conf |
HCI (2)
|
| 1997 | J | jnl |
IEEE Computer Graphics and Applications
|
| 1996 | B | conf |
ICTAI
|
| 1996 | B | conf |
ICTAI
|
| 1991 | J | jnl |
IEEE Expert
|