| Year | Rank | Type | Title / Venue / Authors |
|---|---|---|---|
| 2018 | — | conf |
SecITC
|
| 2011 | C | conf |
APSCC
|
| 2010 | — | conf |
An innovative approach for the wormhole attack detection and prevention in wireless ad hoc networks.
ICNSC
|
| 2010 | J | jnl |
IET Softw.
|
| 2009 | J | jnl |
CoRR
|
| 2009 | — | conf |
HICSS
|
| 2009 | J | jnl |
Egypt. Comput. Sci. J.
|
| 2009 | — | conf |
CSE (3)
|
| 2009 | — | conf |
HICSS
|
| 2009 | C | conf |
SECRYPT
|
| 2009 | — | conf |
SECURWARE
|
| 2008 | B | conf |
ARES
|
| 2008 | — | conf |
CSIIRW
|
| 2008 | C | conf |
IAS
|
| 2008 | C | conf |
IAS
|
| 2008 | — | conf |
CSIIRW
|
| 2008 | B | conf |
ARES
|
| 2008 | B | conf |
ARES
|
| 2007 | — | conf |
ICSNC
|
| 2007 | — | conf |
ICSNC
|
| 2007 | — | conf |
PDCS
|
| 2006 | — | conf |
Q2SWinet
|
| 2006 | C | conf |
SECRYPT
|
| 2005 | A | conf |
ICWS
|
| 2005 | B | conf |
MASS
|
| 2005 | — | conf |
PE-WASUN
|
| 2002 | Misc | conf |
SEC
|
| 1992 | — | conf |
VL
|
| 1989 | J | jnl |
IEEE Data Eng. Bull.
|