| Year | Rank | Type | Title / Venue / Authors |
|---|---|---|---|
| 2026 | J | jnl |
IEEE Internet Things J.
|
| 2026 | J | jnl |
Appl. Soft Comput.
|
| 2026 | J | jnl |
Appl. Soft Comput.
|
| 2024 | J | jnl |
A survey of strategy-driven evasion methods for PE malware: Transformation, concealment, and attack.
Comput. Secur.
|
| 2024 | J | jnl |
IET Inf. Secur.
|
| 2023 | J | jnl |
Comput. Secur.
|
| 2022 | J | jnl |
Appl. Artif. Intell.
|
| 2022 | J | jnl |
CoRR
|
| 2022 | J | jnl |
Inf. Softw. Technol.
|
| 2022 | J | jnl |
Neurocomputing
|
| 2021 | J | jnl |
Appl. Soft Comput.
|
| 2021 | B | conf |
IJCNN
|
| 2021 | J | jnl |
CoRR
|
| 2019 | J | jnl |
IEEE Access
|
| 2019 | J | jnl |
IEEE Access
|
| 2018 | J | jnl |
Comput. J.
|
| 2011 | — | conf |
ICAIC (4)
|