| Year | Rank | Type | Title / Venue / Authors |
|---|---|---|---|
| 2026 | J | jnl |
CoRR
|
| 2026 | J | jnl |
IEEE Access
|
| 2026 | B | conf |
XP
|
| 2026 | J | jnl |
Inf. Softw. Technol.
|
| 2026 | J | jnl |
Comput.
|
| 2025 | J | jnl |
CoRR
|
| 2025 | — | ed. |
XP Workshops
|
| 2025 | — | conf |
ICSOB
|
| 2025 | J | jnl |
IEEE Trans. Software Eng.
|
| 2025 | B | conf |
XP
|
| 2025 | A* | conf |
CCS
|
| 2025 | B | conf |
XP
|
| 2025 | J | jnl |
Inf. Softw. Technol.
|
| 2025 | A* | conf |
ASE
|
| 2025 | A* | conf |
USENIX Security Symposium
|
| 2025 | J | jnl |
CoRR
|
| 2025 | J | jnl |
CoRR
|
| 2025 | A* | conf |
CCS
|
| 2025 | A* | conf |
SP
|
| 2025 | J | jnl |
CoRR
|
| 2025 | A* | conf |
USENIX Security Symposium
|
| 2025 | — | conf |
WETSEB
|
| 2025 | — | conf |
IWSiB@ICSE
|
| 2025 | J | jnl |
IEEE Trans. Inf. Forensics Secur.
|
| 2025 | A* | conf |
CCS
|
| 2025 | A* | conf |
NDSS
|
| 2025 | A* | conf |
USENIX Security Symposium
|
| 2024 | J | jnl |
CoRR
|
| 2024 | J | jnl |
CoRR
|
| 2024 | B | ed. |
XP
|
| 2024 | — | conf |
ICSE (SEIS)
|
| 2024 | — | conf |
SANER (Companion)
|
| 2024 | J | jnl |
CoRR
|
| 2024 | — | ed. |
ICSOB Companion
|
| 2024 | A* | conf |
USENIX Security Symposium
|
| 2024 | — | conf |
iConference (1)
|
| 2024 | J | jnl |
CoRR
|
| 2024 | — | conf |
IDS
|
| 2024 | A* | conf |
NDSS
|
| 2024 | — | conf |
CHASE@ICSE
|
| 2024 | J | jnl |
CoRR
|
| 2024 | J | jnl |
CoRR
|
| 2024 | A* | conf |
SP
|
| 2024 | A* | conf |
USENIX Security Symposium
|
| 2024 | J | jnl |
CoRR
|
| 2024 | A* | conf |
USENIX Security Symposium
|
| 2024 | J | jnl |
CoRR
|
| 2024 | Misc | conf |
EuroPLoP
|
| 2024 | J | jnl |
Inf. Softw. Technol.
|
| 2024 | A* | conf |
USENIX Security Symposium
|
| 2024 | — | conf |
ECCV (87)
|
| 2024 | A | conf |
AsiaCCS
|
| 2024 | J | jnl |
Shining Light into the Tunnel: Understanding and Classifying Network Traffic of Residential Proxies.
CoRR
|
| 2024 | A* | conf |
HPCA
|
| 2024 | A | conf |
DSN
|
| 2024 | J | jnl |
CoRR
|
| 2024 | — | conf |
ICSOB
|
| 2024 | A* | conf |
USENIX Security Symposium
|
| 2024 | A* | conf |
CCS
|
| 2024 | J | jnl |
IEEE Softw.
|
| 2024 | J | jnl |
CoRR
|
| 2024 | J | jnl |
Softw. Pract. Exp.
|
| 2023 | A* | conf |
USENIX Security Symposium
|
| 2023 | J | jnl |
ACM SIGSOFT Softw. Eng. Notes
|
| 2023 | B | conf |
XP
|
| 2023 | — | conf |
XP Workshops
|
| 2023 | A* | conf |
USENIX Security Symposium
|
| 2023 | J | jnl |
CoRR
|
| 2023 | A* | conf |
USENIX Security Symposium
|
| 2023 | — | conf |
ICSOB
|
| 2023 | J | jnl |
J. Inf. Technol.
|
| 2023 | J | jnl |
CoRR
|
| 2023 | J | jnl |
IEEE Trans. Parallel Distributed Syst.
|
| 2023 | A | conf |
ESEM
|
| 2023 | J | jnl |
CoRR
|
| 2023 | Misc | conf |
EuroPLoP
|
| 2023 | J | jnl |
IEEE Access
|
| 2023 | A* | conf |
CCS
|
| 2023 | J | jnl |
CoRR
|
| 2023 | — | conf |
Practitioner Views on Analytics for Software Startups: A Preliminary Guide Based on Gray Literature.
ICSOB
|
| 2023 | — | conf |
ICSOB Companion
|
| 2023 | A* | conf |
USENIX Security Symposium
|
| 2023 | J | jnl |
CoRR
|
| 2023 | J | jnl |
Inf. Softw. Technol.
|
| 2023 | A* | conf |
CCS
|
| 2023 | J | jnl |
CoRR
|
| 2023 | — | conf |
XP Workshops
|
| 2023 | J | jnl |
CoRR
|
| 2023 | J | jnl |
IEEE Trans. Dependable Secur. Comput.
|
| 2023 | — | conf |
XP Workshops
|
| 2023 | A | conf |
Understanding the Security Risks of Decentralized Exchanges by Uncovering Unfair Trades in the Wild.
EuroS&P
|
| 2023 | A* | conf |
USENIX Security Symposium
|
| 2023 | — | conf |
XP Workshops
|
| 2023 | A* | conf |
USENIX Security Symposium
|
| 2022 | B | conf |
XP
|
| 2022 | A* | conf |
CCS
|
| 2022 | J | jnl |
CoRR
|
| 2022 | J | jnl |
IEEE Trans. Software Eng.
|
| 2022 | A* | conf |
NDSS
|
| 2022 | J | jnl |
CoRR
|
| 2022 | — | conf |
BotSE@ICSE
|
| 2022 | A | conf |
EASE
|
| 2022 | J | jnl |
Inf. Softw. Technol.
|
| 2022 | — | conf |
ICSE (SEET)
|
| 2022 | J | jnl |
CoRR
|
| 2022 | C | conf |
SEKE
|
| 2022 | A* | conf |
SP
|
| 2022 | A* | conf |
USENIX Security Symposium
|
| 2022 | J | jnl |
CoRR
|
| 2022 | — | ed. |
ICSOB
|
| 2022 | — | conf |
ICSOB Companion
|
| 2022 | J | jnl |
CoRR
|
| 2022 | J | jnl |
J. Am. Medical Informatics Assoc.
|
| 2022 | J | jnl |
CoRR
|
| 2022 | B | conf |
PROFES
|
| 2022 | A* | conf |
CCS
|
| 2022 | J | jnl |
CoRR
|
| 2022 | J | jnl |
IEEE Trans. Software Eng.
|
| 2021 | B | ed. |
XP
|
| 2021 | A | conf |
EASE
|
| 2021 | A* | conf |
NDSS
|
| 2021 | A* | conf |
SP
|
| 2021 | A* | conf |
SIGIR
|
| 2021 | A* | conf |
USENIX Security Symposium
|
| 2021 | A* | conf |
USENIX Security Symposium
|
| 2021 | J | jnl |
Bioinform.
|
| 2021 | J | jnl |
CoRR
|
| 2021 | B | conf |
CLOUD
|
| 2021 | J | jnl |
CoRR
|
| 2021 | C | ed. |
OpenSym
|
| 2021 | J | jnl |
CoRR
|
| 2021 | J | jnl |
IET Softw.
|
| 2021 | — | ed. |
ICSOB
|
| 2021 | — | conf |
CHASE@ICSE
|
| 2021 | — | conf |
ECIR (2)
|
| 2021 | J | jnl |
Inf. Softw. Technol.
|
| 2021 | J | jnl |
IEEE Trans. Dependable Secur. Comput.
|
| 2021 | A* | conf |
USENIX Security Symposium
|
| 2021 | J | jnl |
CoRR
|
| 2021 | A* | conf |
CCS
|
| 2021 | A* | conf |
NDSS
|
| 2020 | A | conf |
EuroS&P
|
| 2020 | — | conf |
CSEDU (1)
|
| 2020 | A* | conf |
SP
|
| 2020 | A | conf |
ESEM
|
| 2020 | J | jnl |
CoRR
|
| 2020 | J | jnl |
CoRR
|
| 2020 | — | conf |
XP Workshops
|
| 2020 | A* | conf |
CCS
|
| 2020 | A* | conf |
USENIX Security Symposium
|
| 2020 | A* | conf |
SP
|
| 2020 | — | book |
Fundamentals of Software Startups
|
| 2020 | B | conf |
XP
|
| 2020 | B | conf |
SEAA
|
| 2020 | A* | conf |
NDSS
|
| 2020 | B | conf |
SEAA
|
| 2020 | C | ed. |
OpenSym
|
| 2020 | Misc | conf |
EuroPLoP
|
| 2020 | A* | conf |
CCS
|
| 2020 | A* | conf |
USENIX Security Symposium
|
| 2020 | — | ch. |
Fundamentals of Software Startups
|
| 2020 | — | ch. |
Fundamentals of Software Startups
|
| 2020 | — | ch. |
Fundamentals of Software Startups
|
| 2020 | — | ch. |
Fundamentals of Software Startups
|
| 2020 | J | jnl |
CoRR
|
| 2020 | J | jnl |
Int. J. Syst. Softw. Secur. Prot.
|
| 2020 | J | jnl |
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol.
|
| 2020 | A* | conf |
CCS
|
| 2019 | J | jnl |
CoRR
|
| 2019 | — | conf |
ICSOB
|
| 2019 | B | conf |
SEAA
|
| 2019 | J | jnl |
Inf. Softw. Technol.
|
| 2019 | A* | conf |
NDSS
|
| 2019 | A* | conf |
IEEE Symposium on Security and Privacy
|
| 2019 | A* | conf |
IEEE Symposium on Security and Privacy
|
| 2019 | A* | conf |
USENIX Security Symposium
|
| 2019 | B | conf |
PROFES
|
| 2019 | J | jnl |
CoRR
|
| 2019 | — | conf |
ICSOB
|
| 2019 | B | conf |
ICSSP
|
| 2019 | — | conf |
RCoSE-DDrEE@ICSE
|
| 2019 | — | conf |
ICSE (Companion Volume)
|
| 2019 | A | conf |
RAID
|
| 2019 | A* | conf |
USENIX Security Symposium
|
| 2019 | A* | conf |
NDSS
|
| 2019 | A | conf |
SIGCSE
|
| 2019 | A* | conf |
IEEE Symposium on Security and Privacy
|
| 2019 | A* | ed. |
CCS
|
| 2019 | — | ed. |
SiBW
|
| 2019 | J | jnl |
CoRR
|
| 2019 | — | conf |
IWSiB@ESEC/SIGSOFT FSE
|
| 2019 | A* | conf |
IEEE Symposium on Security and Privacy
|
| 2019 | A* | conf |
IEEE Symposium on Security and Privacy
|
| 2019 | — | conf |
ICSOB
|
| 2019 | A | conf |
TraffickStop: Detecting and Measuring Illicit Traffic Monetization Through Large-Scale DNS Analysis.
EuroS&P
|
| 2019 | A* | conf |
USENIX Security Symposium
|
| 2019 | A* | conf |
USENIX Security Symposium
|
| 2019 | — | conf |
HotEdgeVideo@MobiCom
|
| 2018 | — | conf |
SiBW
|
| 2018 | J | jnl |
CoRR
|
| 2018 | A | conf |
ESEM
|
| 2018 | B | ed. |
XP
|
| 2018 | J | jnl |
Cybersecur.
|
| 2018 | J | jnl |
Cybersecur.
|
| 2018 | — | conf |
SiBW
|
| 2018 | J | jnl |
CoRR
|
| 2018 | — | conf |
IWBOSE@SANER
|
| 2018 | — | conf |
ICSOB
|
| 2018 | J | jnl |
CoRR
|
| 2018 | A* | conf |
NDSS
|
| 2018 | J | jnl |
CoRR
|
| 2018 | J | jnl |
Inf. Softw. Technol.
|
| 2018 | B | conf |
ICSSP
|
| 2018 | A* | conf |
NDSS
|
| 2018 | J | jnl |
CoRR
|
| 2018 | J | jnl |
J. Syst. Softw.
|
| 2018 | A | conf |
AsiaCCS
|
| 2018 | A* | conf |
NDSS
|
| 2018 | A* | ed. |
CCS
|
| 2018 | J | jnl |
CoRR
|
| 2018 | A* | conf |
IEEE Symposium on Security and Privacy
|
| 2018 | A* | conf |
USENIX Security Symposium
|
| 2018 | — | conf |
SiBW
|
| 2018 | B | conf |
PROFES
|
| 2018 | J | jnl |
CoRR
|
| 2018 | — | conf |
SiBW
|
| 2018 | A* | conf |
NDSS
|
| 2018 | J | jnl |
CoRR
|
| 2018 | J | jnl |
J. Syst. Softw.
|
| 2017 | J | jnl |
Empir. Softw. Eng.
|
| 2017 | J | jnl |
CoRR
|
| 2017 | J | jnl |
J. Am. Medical Informatics Assoc.
|
| 2017 | J | jnl |
CoRR
|
| 2017 | A | conf |
Internet Measurement Conference
|
| 2017 | J | jnl |
IEEE Secur. Priv.
|
| 2017 | B | conf |
XP
|
| 2017 | — | conf |
FEAST@CCS
|
| 2017 | J | jnl |
CoRR
|
| 2017 | — | conf |
SEmotion@ICSE
|
| 2017 | A* | conf |
NDSS
|
| 2017 | J | jnl |
CoRR
|
| 2017 | A | conf |
RAID
|
| 2017 | J | jnl |
J. Softw. Evol. Process.
|
| 2017 | — | conf |
XP Workshops
|
| 2017 | A | conf |
DSN
|
| 2017 | J | jnl |
CoRR
|
| 2017 | — | conf |
WISEC
|
| 2017 | J | jnl |
CoRR
|
| 2017 | A* | conf |
CCS
|
| 2017 | J | jnl |
CoRR
|
| 2017 | A* | conf |
CCS
|
| 2017 | A | conf |
EASE
|
| 2017 | J | jnl |
CoRR
|
| 2017 | A* | conf |
USENIX Security Symposium
|
| 2017 | J | jnl |
CoRR
|
| 2017 | B | conf |
SEAA
|
| 2017 | A* | conf |
CCS
|
| 2017 | A* | conf |
USENIX Security Symposium
|
| 2017 | J | jnl |
IEEE Softw.
|
| 2017 | A | conf |
ESEM
|
| 2017 | J | jnl |
CoRR
|
| 2017 | J | jnl |
CoRR
|
| 2017 | — | conf |
ICSE (Companion Volume)
|
| 2017 | A* | conf |
CCS
|
| 2017 | B | conf |
XP
|
| 2017 | J | jnl |
CoRR
|
| 2017 | J | jnl |
CoRR
|
| 2017 | J | jnl |
CoRR
|
| 2016 | A* | conf |
CCS
|
| 2016 | — | conf |
ICE/ITMC
|
| 2016 | A | conf |
ACSAC
|
| 2016 | A* | conf |
IEEE Symposium on Security and Privacy
|
| 2016 | — | conf |
ICSOB
|
| 2016 | Misc | ed. |
Inscrypt
|
| 2016 | B | conf |
XP
|
| 2016 | A* | conf |
CCS
|
| 2016 | — | conf |
CRI
|
| 2016 | A | ed. |
AsiaCCS
|
| 2016 | B | conf |
SEAA
|
| 2016 | A* | conf |
IEEE Symposium on Security and Privacy
|
| 2016 | J | jnl |
e Informatica Softw. Eng. J.
|
| 2016 | A* | conf |
IEEE Symposium on Security and Privacy
|
| 2015 | B | conf |
ICSSP
|
| 2015 | J | jnl |
J. Syst. Softw.
|
| 2015 | J | jnl |
J. Am. Medical Informatics Assoc.
|
| 2015 | A* | conf |
CCS
|
| 2015 | J | jnl |
J. Softw. Evol. Process.
|
| 2015 | A* | conf |
CCS
|
| 2015 | A | conf |
RAID
|
| 2015 | A* | conf |
USENIX Security Symposium
|
| 2015 | J | jnl |
CoRR
|
| 2015 | A* | conf |
CCS
|
| 2015 | J | jnl |
CoRR
|
| 2015 | J | jnl |
PeerJ Comput. Sci.
|
| 2015 | J | jnl |
CoRR
|
| 2015 | B | conf |
XP
|
| 2015 | — | conf |
XP Workshops
|
| 2015 | A* | conf |
IEEE Symposium on Security and Privacy
|
| 2015 | A* | conf |
CCS
|
| 2015 | A* | conf |
CCS
|
| 2015 | J | jnl |
ACM Comput. Surv.
|
| 2015 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2015 | C | ed. |
SecureComm
|
| 2015 | — | conf |
CHASE@ICSE
|
| 2015 | J | jnl |
CoRR
|
| 2015 | J | jnl |
CoRR
|
| 2015 | J | jnl |
CoRR
|
| 2015 | J | jnl |
CoRR
|
| 2015 | — | conf |
SSE@SIGSOFT FSE
|
| 2015 | J | jnl |
CoRR
|
| 2015 | A* | conf |
NDSS
|
| 2014 | J | jnl |
Scientometrics
|
| 2014 | A* | conf |
CCS
|
| 2014 | J | jnl |
CoRR
|
| 2014 | Misc | conf |
CHI PLAY
|
| 2014 | A* | conf |
IEEE Symposium on Security and Privacy
|
| 2014 | A* | conf |
NDSS
|
| 2014 | A* | conf |
CCS
|
| 2014 | J | jnl |
IEEE Softw.
|
| 2014 | B | conf |
EDBT
|
| 2014 | J | jnl |
CoRR
|
| 2014 | A* | conf |
NDSS
|
| 2014 | B | conf |
XP
|
| 2014 | J | jnl |
IEEE Softw.
|
| 2014 | J | jnl |
CoRR
|
| 2014 | A* | conf |
IEEE Symposium on Security and Privacy
|
| 2014 | A* | conf |
NDSS
|
| 2014 | B | conf |
XP
|
| 2014 | J | jnl |
IEEE Trans. Wirel. Commun.
|
| 2014 | J | jnl |
ACM SIGSOFT Softw. Eng. Notes
|
| 2014 | J | jnl |
CoRR
|
| 2014 | A* | conf |
USENIX Security Symposium
|
| 2014 | A* | conf |
IEEE Symposium on Security and Privacy
|
| 2014 | — | conf |
ICSOB
|
| 2013 | J | jnl |
CoRR
|
| 2013 | — | conf |
CloudCom (2)
|
| 2013 | — | conf |
LESS
|
| 2013 | — | conf |
SEHC@ICSE
|
| 2013 | B | conf |
PROFES
|
| 2013 | J | jnl |
CoRR
|
| 2013 | B | conf |
XP
|
| 2013 | A* | conf |
IEEE Symposium on Security and Privacy
|
| 2013 | A* | conf |
CCS
|
| 2013 | A* | conf |
NDSS
|
| 2013 | — | conf |
LESS
|
| 2013 | — | ed. |
SESP@CCS Asia
|
| 2013 | J | jnl |
ACM SIGSOFT Softw. Eng. Notes
|
| 2013 | — | conf |
ICSOB
|
| 2013 | J | jnl |
CoRR
|
| 2013 | A* | conf |
CCS
|
| 2012 | J | jnl |
J. Syst. Softw.
|
| 2012 | J | jnl |
Inf. Syst. J.
|
| 2012 | — | conf |
WICSA/ECSA Companion Volume
|
| 2012 | A* | conf |
CCS
|
| 2012 | A* | conf |
NDSS
|
| 2012 | — | conf |
HISB
|
| 2012 | — | conf |
FHIES
|
| 2012 | A* | conf |
IEEE Symposium on Security and Privacy
|
| 2012 | J | jnl |
Inf. Syst. J.
|
| 2011 | — | conf |
EUROMICRO-SEAA
|
| 2011 | — | conf |
Financial Cryptography
|
| 2011 | C | conf |
ICIS
|
| 2011 | — | ch. |
Encyclopedia of Cryptography and Security (2nd Ed.)
|
| 2011 | — | conf |
ECIS
|
| 2011 | A* | conf |
IEEE Symposium on Security and Privacy
|
| 2011 | C | conf |
SPICE
|
| 2011 | — | ch. |
Encyclopedia of Cryptography and Security (2nd Ed.)
|
| 2011 | J | jnl |
IEEE Softw.
|
| 2011 | J | jnl |
IEEE Secur. Priv.
|
| 2011 | A* | conf |
CCS
|
| 2011 | A* | conf |
NDSS
|
| 2011 | — | conf |
AGILE
|
| 2011 | A | conf |
ESORICS
|
| 2011 | — | conf |
CTS
|
| 2010 | B | ed. |
XP
|
| 2010 | J | jnl |
ACM Trans. Inf. Syst. Secur.
|
| 2010 | A | conf |
ACSAC
|
| 2010 | — | conf |
LESS
|
| 2010 | A | conf |
DSN
|
| 2010 | — | conf |
Human Benefit through the Diffusion of Information Systems Design Science Research
|
| 2010 | — | conf |
CTS
|
| 2010 | A* | conf |
IEEE Symposium on Security and Privacy
|
| 2010 | A* | conf |
CCS
|
| 2010 | B | conf |
XP
|
| 2010 | — | ch. |
Agility Across Time and Space
|
| 2010 | J | jnl |
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.
|
| 2010 | J | jnl |
IEEE Trans. Dependable Secur. Comput.
|
| 2009 | J | jnl |
Eur. J. Inf. Syst.
|
| 2009 | — | conf |
ISD
|
| 2009 | J | jnl |
Inf. Syst. Res.
|
| 2009 | — | conf |
CreativeSME
|
| 2009 | J | jnl |
Int. J. Inf. Sec.
|
| 2009 | A* | conf |
USENIX Security Symposium
|
| 2009 | A* | conf |
CCS
|
| 2009 | — | conf |
Financial Cryptography
|
| 2009 | A* | conf |
USENIX Security Symposium
|
| 2009 | A* | conf |
CCS
|
| 2009 | — | conf |
ECIS
|
| 2009 | B | conf |
XP
|
| 2009 | J | jnl |
ACM SIGSOFT Softw. Eng. Notes
|
| 2008 | — | conf |
ECIS
|
| 2008 | J | jnl |
Int. J. Inf. Sec.
|
| 2008 | A | conf |
DSN
|
| 2008 | B | ed. |
XP
|
| 2008 | J | jnl |
ACM Trans. Inf. Syst. Secur.
|
| 2008 | J | jnl |
Int. J. Crit. Infrastructure Prot.
|
| 2008 | Misc | conf |
HotMobile
|
| 2008 | A* | conf |
NDSS
|
| 2008 | A* | conf |
USENIX Security Symposium
|
| 2008 | A* | conf |
CCS
|
| 2007 | C | conf |
ICIS
|
| 2007 | — | conf |
ECIS
|
| 2007 | A | conf |
RAID
|
| 2006 | C | conf |
SecureComm
|
| 2006 | — | conf |
S&P
|
| 2006 | J | jnl |
J. Inf. Technol.
|
| 2006 | — | conf |
ECIS
|
| 2006 | A* | conf |
CCS
|
| 2006 | B | conf |
SRDS
|
| 2005 | B | conf |
ACNS
|
| 2004 | A* | conf |
CCS
|
| 2004 | A* | conf |
CCS
|
| 2004 | — | conf |
VTC Fall (2)
|
| 2003 | — | conf |
S&P
|