| Year | Rank | Type | Title / Venue / Authors |
|---|---|---|---|
| 2008 | J | jnl |
Perform. Evaluation
|
| 2006 | J | jnl |
Clust. Comput.
|
| 2005 | Misc | conf |
SAC
|
| 2005 | J | jnl |
ACM Trans. Internet Techn.
|
| 2004 | Misc | conf |
SAC
|
| 2004 | J | jnl |
Comput. Secur.
|
| 2004 | B | conf |
NCA
|
| 2003 | C | conf |
CLUSTER
|
| 2002 | Misc | conf |
SAC
|
| 2002 | A | conf |
ACSAC
|
| 2001 | A | conf |
ACSAC
|
| 2001 | — | conf |
S&P
|
| 2001 | J | jnl |
Appl. Artif. Intell.
|
| 2001 | — | conf |
WELCOM
|
| 2000 | A | conf |
ACSAC
|
| 2000 | A | conf |
DISC
|
| 2000 | C | conf |
COORDINATION
|
| 2000 | J | jnl |
ACM Trans. Softw. Eng. Methodol.
|
| 2000 | — | conf |
SAC (1)
|
| 1998 | A | conf |
ICDCS
|
| 1998 | A* | conf |
USENIX Security Symposium
|
| 1997 | C | conf |
COORDINATION
|
| 1996 | — | conf |
CDS
|