The SCEAS System
Navigation Menu

Journals and Conferences that author prefers


Sushil Jajodia: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Journals

  1. IEEE Trans. Knowl. Data Eng. (15 paper(s))
  2. Journal of Computer Security (9 paper(s))
  3. Inf. Sci. (8 paper(s))
  4. IEEE Trans. Software Eng. (7 paper(s))
  5. ACM Trans. Database Syst. (7 paper(s))
  6. Computer Communications (5 paper(s))
  7. Distributed and Parallel Databases (4 paper(s))
  8. SIGMOD Record (4 paper(s))
  9. ACM Trans. Inf. Syst. Secur. (4 paper(s))
  10. IEEE Database Eng. Bull. (4 paper(s))
  11. Ad Hoc Networks (3 paper(s))
  12. Data Knowl. Eng. (3 paper(s))
  13. Journal of Systems and Software (2 paper(s))
  14. TOSN (2 paper(s))
  15. IEEE Trans. Parallel Distrib. Syst. (2 paper(s))
  16. Ann. Math. Artif. Intell. (2 paper(s))
  17. BIT (2 paper(s))
  18. CoRR (2 paper(s))
  19. Inf. Process. Lett. (2 paper(s))
  20. Computers & Security (2 paper(s))
  21. IEEE Computer (2 paper(s))
  22. ACM Comput. Surv. (2 paper(s))
  23. ACM Trans. Inf. Syst. (1 paper(s))
  24. Artif. Intell. (1 paper(s))
  25. Decision Support Systems (1 paper(s))
  26. (1 paper(s))
  27. Electr. Notes Theor. Comput. Sci. (1 paper(s))
  28. Nord. J. Comput. (1 paper(s))
  29. IEEE Concurrency (1 paper(s))
  30. Perform. Eval. (1 paper(s))
  31. Commun. ACM (1 paper(s))
  32. International Journal on Artificial Intelligence Tools (1 paper(s))
  33. SIGKDD Explorations (1 paper(s))
  34. IEEE Trans. Computers (1 paper(s))
  35. Comput. J. (1 paper(s))
  36. Information & Software Technology (1 paper(s))
  37. Theor. Comput. Sci. (1 paper(s))
  38. Inf. Syst. (1 paper(s))
  39. IEEE Trans. Dependable Sec. Comput. (1 paper(s))
  40. IEEE Data Eng. Bull. (1 paper(s))
  41. J. Network Syst. Manage. (1 paper(s))
  42. ACM Trans. Comput. Syst. (1 paper(s))
  43. Int. J. on Digital Libraries (1 paper(s))
  44. J. Data Semantics (1 paper(s))

Conferences

  1. (41 paper(s))
  2. Database Security (DBSec) (33 paper(s))
  3. Conference on Computer and Communications Security (CCS) (15 paper(s))
  4. IEEE Symposium on Security and Privacy (S&P) (13 paper(s))
  5. European Symposium on Research in Computer Security (ESORICS) (8 paper(s))
  6. IEEE Computer Security Foundations Workshop (CSFW) (8 paper(s))
  7. Annual Computer Security Applications Conference (7 paper(s))
  8. Information Security (6 paper(s))
  9. ACM SIGMOD Conference (6 paper(s))
  10. Very Large Data Bases (VLDB) Conference (5 paper(s))
  11. Secure Data Management (5 paper(s))
  12. International Conference on Data Engineering (ICDE) (4 paper(s))
  13. TIME Symposium / Workshop (4 paper(s))
  14. Conference on Advanced Information Systems Engineering (CAiSE) (3 paper(s))
  15. International Conference on Conceptual Modeling (ER) (3 paper(s))
  16. Publications Resulting from Dagstuhl Seminars (3 paper(s))
  17. MobiQuitous - International Conference on Mobile and Ubiquitous Systems: Networking and Services (2 paper(s))
  18. Distributed Computing and Internet Technology (2 paper(s))
  19. International Conference on Distributed Computing Systems (ICDCS) (2 paper(s))
  20. Symposium on Principles of Database Systems (PODS) (2 paper(s))
  21. Integrity and Internal Control in Information Systems (IICIS) (2 paper(s))
  22. Policies for Distributed Systems and Networks (2 paper(s))
  23. ACM Digital Rights Management Workshop (2 paper(s))
  24. ACM Symposium on Applied Computing (SAC) (2 paper(s))
  25. (2 paper(s))
  26. Dependable Systems and Networks (2 paper(s))
  27. Information Hiding Workshop (2 paper(s))
  28. ACM Symposium on Access Control Models and Technologies (SACMAT) (1 paper(s))
  29. Applied Cryptography and Network Security (1 paper(s))
  30. Engineering of Computer-Based Systems (ECBS) (1 paper(s))
  31. International Parallel (and Distributed) Processing Symposium (IP(D)PS) (1 paper(s))
  32. Workshop on Security of ad hoc and Sensor Networks (1 paper(s))
  33. International Conference on Web-Age Information Management (WAIM) (1 paper(s))
  34. International Conference on Extending Database Technology (EDBT) (1 paper(s))
  35. International Workshop on Distributed Computing (IWDC) (1 paper(s))
  36. Workshop on the Management of Replicated Data (1 paper(s))
  37. Workshop on Multimedia Information Systems (MIS) (1 paper(s))
  38. Sistemi Evoluti per Basi di Dati (SEBD) (1 paper(s))
  39. Workshop on Privacy in the Electronic Society (1 paper(s))
  40. Mathematical Methods, Models, and Architectures for Network Security Systems (MMM-ACNS) (1 paper(s))
  41. International Conference on Information and Knowledge Management (CIKM) (1 paper(s))
  42. International Symposium on Foundations of Information and Knowledge Systems (FoIKS) (1 paper(s))
  43. ACM SenSys (1 paper(s))
  44. Principles and Practice of Constraint Programming (CP) (1 paper(s))
  45. Foundations of Software Technology and Theoretical Computer Science (FSTTCS) (1 paper(s))
  46. Networked Group Communication (NGC) (1 paper(s))
  47. Conference on Object-Oriented Programming Systems, Languages, and Applications (OOPSLA) (1 paper(s))
  48. IEEE Security in Storage Workshop (1 paper(s))
  49. Privacy Enhancing Technologies (1 paper(s))
  50. International Conference on Distributed Computing Systems (ICDCS) - Workshops (1 paper(s))
  51. Databases in Networked Information Systems (DNIS) (1 paper(s))
  52. International Conference on Deductive and Object-Oriented Databases (DOOD) (1 paper(s))
  53. International Conference on Information and Communication Security (ICICS) (1 paper(s))
  54. Principles of Mobile Computing (1 paper(s))
  55. Temporal, Spatial, and Spatio-Temporal Data Mining (TSDM) (1 paper(s))
  56. International Conference on Network Protocols (1 paper(s))
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002