| Year | Rank | Type | Title / Venue / Authors |
|---|---|---|---|
| 2023 | J | jnl |
IEEE Access
|
| 2022 | J | jnl |
CoRR
|
| 2018 | A* | conf |
LICS
|
| 2014 | — | conf |
CompleNet
|
| 2013 | — | conf |
SITIS
|
| 2012 | — | ed. |
NCMA
|
| 2012 | — | conf |
Complex
|
| 2011 | — | conf |
ISSA
|
| 2011 | — | conf |
NCMA
|
| 2010 | J | jnl |
HMD Prax. Wirtsch.
|
| 2009 | — | conf |
ISSA
|
| 2009 | — | ed. |
MSVVEIS
|
| 2008 | — | conf |
ISSA
|
| 2008 | — | conf |
MSVVEIS
|
| 2008 | — | conf |
ISSA
|
| 2008 | — | conf |
ICSOFT (PL/DPS/KE)
|
| 2008 | — | ed. |
MSVVEIS
|
| 2008 | B | conf |
LCN
|
| 2008 | — | conf |
MSVVEIS
|
| 2007 | J | jnl |
Theor. Comput. Sci.
|
| 2007 | J | jnl |
Inf. Process. Lett.
|
| 2007 | — | conf |
AINA Workshops (1)
|
| 2007 | — | conf |
DRCN
|
| 2007 | — | ed. |
MSVVEIS
|
| 2007 | J | jnl |
Sci. Comput. Program.
|
| 2006 | — | conf |
DCFS
|
| 2006 | — | conf |
ISSA
|
| 2006 | — | conf |
WINSYS
|
| 2006 | — | ed. |
MSVVEIS
|
| 2006 | J | jnl |
J. Comput. Virol.
|
| 2006 | — | conf |
MSVVEIS
|
| 2005 | — | conf |
MSVVEIS
|
| 2005 | — | conf |
ICETE
|
| 2005 | — | conf |
MSVVEIS
|
| 2005 | — | ed. |
MSVVEIS
|
| 2004 | C | conf |
IPCCC
|
| 2004 | J | jnl |
Theory Pract. Log. Program.
|
| 2004 | — | conf |
ISSA
|
| 2004 | — | conf |
ICETE (2)
|
| 2004 | — | ed. |
VVEIS
|
| 2003 | — | conf |
NDDL/VVEIS
|
| 2003 | J | jnl |
Softw. Test. Verification Reliab.
|
| 2003 | — | ed. |
NDDL/VVEIS
|
| 2002 | — | conf |
ISSA
|
| 2002 | — | conf |
Configuring Firewalls - An XML-based Approach to Modelling and Implementing Firewall Configurations.
ISSA
|
| 2002 | B | conf |
SOFSEM
|
| 2001 | J | jnl |
CoRR
|
| 2001 | A* | conf |
PODC
|
| 2001 | C | conf |
FORTE
|
| 2000 | C | conf |
FORTE
|
| 2000 | — | conf |
ECIS
|
| 1999 | B | conf |
SOFSEM
|
| 1999 | — | conf |
Conference on Information Security Management & Small Systems Security
|
| 1998 | J | jnl |
J. Syst. Softw.
|
| 1998 | — | conf |
MFCS Workshop on Concurrency
|