| Year | Rank | Type | Title / Venue / Authors |
|---|---|---|---|
| 2026 | J | jnl |
Inf. Sci.
|
| 2026 | J | jnl |
Cybersecur.
|
| 2025 | J | jnl |
IET Image Process.
|
| 2025 | J | jnl |
J. Vis. Commun. Image Represent.
|
| 2025 | J | jnl |
J. Netw. Comput. Appl.
|
| 2025 | J | jnl |
J. Electronic Imaging
|
| 2025 | J | jnl |
Comput. Secur.
|
| 2025 | J | jnl |
J. Netw. Comput. Appl.
|
| 2025 | J | jnl |
Circuits Syst. Signal Process.
|
| 2025 | J | jnl |
The DUDFTO Attack: Towards Down-to-UP Timeout Probing and Dynamically Flow Table Overflowing in SDN.
IEEE Trans. Netw. Serv. Manag.
|
| 2025 | J | jnl |
J. King Saud Univ. Comput. Inf. Sci.
|
| 2024 | C | conf |
ISPA
|
| 2024 | J | jnl |
Comput. Secur.
|
| 2023 | J | jnl |
IEEE Trans. Dependable Secur. Comput.
|
| 2023 | J | jnl |
J. Netw. Comput. Appl.
|
| 2022 | J | jnl |
Int. J. Distributed Sens. Networks
|
| 2022 | J | jnl |
IEEE Trans. Dependable Secur. Comput.
|
| 2022 | J | jnl |
IEEE Access
|
| 2022 | — | conf |
ICAIS (3)
|
| 2021 | J | jnl |
Softw. Pract. Exp.
|
| 2021 | B | conf |
IJCNN
|
| 2021 | J | jnl |
IET Image Process.
|
| 2020 | J | jnl |
World Wide Web
|
| 2020 | J | jnl |
Int. J. Distributed Sens. Networks
|
| 2020 | J | jnl |
Multim. Tools Appl.
|
| 2020 | J | jnl |
Multim. Tools Appl.
|
| 2020 | J | jnl |
Multim. Tools Appl.
|
| 2019 | C | conf |
IWDW
|
| 2019 | C | conf |
IWDW
|
| 2019 | J | jnl |
Multim. Tools Appl.
|
| 2018 | — | conf |
ICCCS (4)
|
| 2018 | J | jnl |
CoRR
|
| 2018 | J | jnl |
Multim. Tools Appl.
|
| 2018 | J | jnl |
Pers. Ubiquitous Comput.
|
| 2018 | Misc | conf |
TRIDENTCOM
|
| 2018 | J | jnl |
CoRR
|
| 2018 | J | jnl |
CoRR
|
| 2017 | — | conf |
ICCCS (1)
|