| Year | Rank | Type | Title / Venue / Authors |
|---|---|---|---|
| 2016 | J | jnl |
Int. J. Comput. Sci. Eng.
|
| 2014 | J | jnl |
J. Networks
|
| 2013 | J | jnl |
J. Softw.
|
| 2012 | J | jnl |
J. Comput.
|
| 2011 | J | jnl |
J. Comput.
|
| 2010 | J | jnl |
J. Digit. Content Technol. its Appl.
|
| 2010 | J | jnl |
J. Comput.
|
| 2010 | J | jnl |
J. Comput.
|
| 2008 | — | conf |
Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security
|
| 2007 | — | conf |
SNPD (1)
|
| 2007 | C | conf |
CIT
|
| 2007 | — | conf |
Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security
|
| 2005 | — | conf |
WAIM
|
| 2002 | J | jnl |
J. Comput. Sci. Technol.
|