| Year | Rank | Type | Title / Venue / Authors |
|---|---|---|---|
| 2025 | — | conf |
CSEE&T
|
| 2025 | — | conf |
ITiCSE (1)
|
| 2025 | J | jnl |
CoRR
|
| 2023 | A | conf |
ICSME
|
| 2022 | A | conf |
ICSME
|
| 2021 | J | jnl |
CoRR
|
| 2021 | A* | conf |
ICSE
|
| 2021 | J | jnl |
Sci. Comput. Program.
|
| 2020 | J | jnl |
Reliab. Eng. Syst. Saf.
|
| 2019 | C | conf |
SCAM
|
| 2019 | A | conf |
ICSME
|
| 2019 | — | conf |
HICSS
|
| 2019 | J | jnl |
CoRR
|
| 2019 | A | conf |
ICSME
|
| 2019 | — | conf |
CHI Extended Abstracts
|
| 2018 | — | conf |
CAiSE Forum
|
| 2018 | — | conf |
SICSA ReaLX
|
| 2018 | J | jnl |
J. Inf. Secur. Appl.
|
| 2017 | J | jnl |
ACM Comput. Surv.
|
| 2017 | J | jnl |
Digit. Investig.
|
| 2017 | — | conf |
CSEE&T
|
| 2017 | — | conf |
AMCIS
|
| 2017 | J | jnl |
CoRR
|
| 2016 | J | jnl |
CoRR
|
| 2016 | J | jnl |
J. Digit. Forensics Secur. Law
|
| 2015 | — | conf |
EOMAS@CAiSE
|
| 2015 | J | jnl |
CoRR
|
| 2015 | — | ch. |
The Cloud Security Ecosystem
|
| 2015 | — | conf |
AMCIS
|
| 2015 | J | jnl |
CoRR
|
| 2014 | J | jnl |
CoRR
|
| 2014 | — | conf |
AMCIS
|
| 2014 | J | jnl |
CoRR
|
| 2013 | J | jnl |
Comput. Secur.
|
| 2013 | J | jnl |
Digit. Investig.
|
| 2013 | — | conf |
ECIS
|
| 2013 | J | jnl |
CoRR
|
| 2013 | — | conf |
IFIP Int. Conf. Digital Forensics
|
| 2013 | C | conf |
PST
|
| 2013 | — | conf |
AMCIS
|
| 2013 | J | jnl |
CoRR
|
| 2013 | — | conf |
HICSS
|
| 2013 | J | jnl |
CoRR
|
| 2012 | J | jnl |
Int. J. Digit. Crime Forensics
|
| 2012 | — | conf |
Monterey Workshop
|
| 2012 | J | jnl |
CoRR
|
| 2011 | J | jnl |
Digit. Investig.
|
| 2011 | J | jnl |
Digit. Investig.
|
| 2011 | J | jnl |
Int. J. Inf. Sec.
|
| 2011 | — | conf |
STM
|
| 2009 | B | conf |
ARES
|
| 2009 | A | conf |
CAiSE
|
| 2007 | B | conf |
ICALT
|
| 2005 | C | conf |
PST
|
| 2005 | — | conf |
COMPSAC (1)
|
| 2004 | C | conf |
PST
|