
Research Area
#Computer science#Computer security#Access control#Computer network#Encryption#Information privacy#Internet privacy#Data mining#Database#Wireless sensor network
SCIE paper information
Papers relevant to ‘Computer science’: 75
Research performance of SCIE papers matching with ‘Computer science’
*Papers published between 2014 and 2020 were selected, and the citation number was determined by bing.com.
Secure Data Aggregation Technique for Wireless Sensor Networks in the Presence of Collusion Attacks
2015/01 IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING 1.592 Impact Factor 200 citations
Detecting mobile malware threats to homeland security through static analysis
2014/02 JOURNAL OF NETWORK AND COMPUTER APPLICATIONS 2.229 Impact Factor 173 citations
Papers for author ‘Elisa Bertino’: 78
Number of published SCIE papers by year
*Papers published between 2014 and 2020 were selected, and the citation number was determined by bing.com.
Secure Data Aggregation Technique for Wireless Sensor Networks in the Presence of Collusion Attacks
2015/01 IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING 1.592 Impact Factor 200 citations
Detecting mobile malware threats to homeland security through static analysis
2014/02 JOURNAL OF NETWORK AND COMPUTER APPLICATIONS 2.229 Impact Factor 173 citations
conference information
Papers relevant to ‘Computer science’: 53
Research performance of Top-tier Conference matching with ‘Computer science’
*Papers published between 2014 and 2020 were selected, and the citation number was determined by bing.com.
Kalis — A System for Knowledge-Driven Adaptable Intrusion Detection for the Internet of Things
2017/06 ICDCS Top-tier Conference 124 citations
LTEInspector: A Systematic Approach for Adversarial Testing of 4G LTE
2018/02 NDSS Top-tier Conference 113 citations
Papers for author ‘Elisa Bertino’: 53
Number of published Top-tier Conference by year
*Papers published between 2014 and 2020 were selected, and the citation number was determined by bing.com.
Kalis — A System for Knowledge-Driven Adaptable Intrusion Detection for the Internet of Things
2017/06 ICDCS Top-tier Conference 124 citations
LTEInspector: A Systematic Approach for Adversarial Testing of 4G LTE
2018/02 NDSS Top-tier Conference 113 citations
Log in to PhD.GO
Access the Bookmarks
Add or remove professors and programs of interest from your Bookmarks
Subscribe to the graduate program newsletters that you've bookmarked
Enter your test results to ensure you meet the minimum for each graduate program at Bookmarks
At a glance, see program deadlines you've bookmarked on your calendar