| Year | Rank | Type | Title / Venue / Authors |
|---|---|---|---|
| 2023 | J | jnl |
Comput. Secur.
|
| 2021 | J | jnl |
Int. J. Electron. Secur. Digit. Forensics
|
| 2015 | — | ch. |
Terrorist Use of Cyberspace and Cyber Terrorism
|
| 2013 | — | conf |
DigCurV
|
| 2013 | — | conf |
IASSIST Conference
|
| 2013 | J | jnl |
Int. J. Digit. Curation
|
| 2013 | — | conf |
IASSIST Conference
|
| 2012 | — | conf |
IASSIST Conference
|
| 2012 | — | conf |
IASSIST Conference
|
| 2011 | — | conf |
IASSIST Conference
|
| 2010 | — | conf |
IASSIST
|
| 2009 | — | conf |
IASSIST Conference
|
| 2009 | — | conf |
ECDL
|
| 2007 | J | jnl |
J. Inf. Sci.
|
| 2005 | — | conf |
IASSIST Conference
|
| 2004 | — | conf |
IASSIST Conference
|
| 2004 | J | jnl |
Inf. Econ. Policy
|
| 2003 | J | jnl |
J. Inf. Law Technol.
|
| 2002 | J | jnl |
Int. J. Netw. Virtual Organisations
|
| 2002 | J | jnl |
Int. J. Inf. Technol. Manag.
|
| 2001 | J | jnl |
Int. J. Manuf. Technol. Manag.
|
| 1998 | J | jnl |
Comput. Law Secur. Rev.
|
| 1997 | J | jnl |
Comput. Law Secur. Rev.
|
| 1996 | J | jnl |
J. Strateg. Inf. Syst.
|
| 1994 | J | jnl |
Comput. Law Secur. Rev.
|
| 1983 | J | jnl |
Aust. Comput. J.
|