| Year | Rank | Type | Title / Venue / Authors |
|---|---|---|---|
| 2025 | J | jnl |
Inf. Comput. Secur.
|
| 2024 | C | conf |
ICISSP
|
| 2022 | C | conf |
SERA
|
| 2022 | — | conf |
HPEC
|
| 2015 | — | ch. |
Computer and Information Science
|
| 2013 | C | conf |
ICIS
|
| 2013 | J | jnl |
Int. J. Comput. Their Appl.
|
| 2012 | — | conf |
ACIS-ICIS
|
| 2009 | C | conf |
CAINE
|
| 2009 | — | conf |
Software Engineering Research and Practice
|
| 2009 | — | conf |
Security and Management
|
| 2009 | Misc | ed. |
CATA
|
| 2009 | C | conf |
CAINE
|
| 2008 | C | conf |
CAINE
|
| 2007 | C | conf |
CAINE
|
| 2006 | C | conf |
CAINE
|
| 2006 | J | jnl |
Simul.
|
| 2006 | B | conf |
Cluster Security Research Involving the Modeling of Network Exploitations Using Exploitation Graphs.
CCGRID
|
| 2006 | — | conf |
HICSS
|
| 2005 | — | conf |
HICSS
|