| Year | Rank | Type | Title / Venue / Authors |
|---|---|---|---|
| 2026 | J | jnl |
IEEE Internet Things J.
|
| 2026 | J | jnl |
IEEE Trans. Inf. Forensics Secur.
|
| 2026 | J | jnl |
Appl. Soft Comput.
|
| 2025 | J | jnl |
IEEE Trans. Inf. Forensics Secur.
|
| 2025 | J | jnl |
IEEE Trans. Inf. Forensics Secur.
|
| 2024 | J | jnl |
A survey of strategy-driven evasion methods for PE malware: Transformation, concealment, and attack.
Comput. Secur.
|
| 2024 | J | jnl |
CoRR
|
| 2024 | J | jnl |
IEEE Trans. Inf. Forensics Secur.
|
| 2024 | J | jnl |
Comput. J.
|
| 2023 | J | jnl |
Comput. Secur.
|
| 2023 | J | jnl |
Comput. Electr. Eng.
|
| 2022 | J | jnl |
Comput. Electr. Eng.
|
| 2019 | J | jnl |
Symmetry
|