| Year | Rank | Type | Title / Venue / Authors |
|---|---|---|---|
| 2025 | J | jnl |
IEEE Trans. Inf. Forensics Secur.
|
| 2025 | J | jnl |
IEEE Syst. J.
|
| 2025 | J | jnl |
CoRR
|
| 2024 | — | conf |
SysCon
|
| 2022 | — | conf |
ESORICS (1)
|
| 2022 | C | conf |
ICICS
|
| 2020 | — | book |
|
| 2016 | — | book |
Cyber Deception
|
| 2016 | B | ed. |
DBSec
|
| 2015 | — | book |
Cyber Warfare
|
| 2014 | — | book |
|
| 2013 | — | book |
|
| 2011 | — | book |
Moving Target Defense
|
| 2010 | — | ch. |
Cyber Situational Awareness
|
| 2010 | — | book |
Cyber Situational Awareness
|
| 2010 | — | conf |
IFIPTM
|
| 2008 | — | conf |
POLICY
|
| 2008 | J | jnl |
Computer
|
| 2006 | Misc | conf |
ICISS
|
| 2006 | — | conf |
QoP
|
| 2006 | C | conf |
SACMAT
|
| 2006 | — | conf |
POLICY
|
| 2005 | J | jnl |
IEEE Trans. Dependable Secur. Comput.
|
| 2005 | — | conf |
MMM-ACNS
|
| 2004 | B | conf |
DBSec
|
| 2004 | J | jnl |
NeuroImage
|
| 2004 | — | ed. |
SASN
|
| 2004 | Misc | conf |
SEC
|
| 2003 | — | conf |
Digital Rights Management Workshop
|
| 2003 | A | conf |
ACSAC
|
| 2003 | — | ed. |
SASN
|
| 2003 | A | conf |
CIKM
|
| 1999 | — | conf |
Secure Internet Programming
|
| 1998 | — | conf |
Mobile Agents and Security
|
| 1998 | — | conf |
ECOOP Workshops
|
| 1998 | — | conf |
ECOOP Workshops
|
| 1996 | A | conf |
ESORICS
|
| 1995 | J | jnl |
LISP Symb. Comput.
|
| 1993 | A | conf |
ACSAC
|
| 1992 | — | — |
|
| 1991 | — | conf |
Constructivity in Computer Science
|
| 1991 | — | conf |
FPCA
|