Search

Your search keyword '"Iryna Yevseyeva"' showing total 97 results

Search Constraints

Start Over You searched for: Author "Iryna Yevseyeva" Remove constraint Author: "Iryna Yevseyeva"
97 results on '"Iryna Yevseyeva"'

Search Results

1. Sensor placement in water distribution networks using centrality-guided multi-objective optimisation

2. Artificial Intelligence–Based Ethical Hacking for Health Information Systems: Simulation Study

3. Addressing consumerization of IT risks with nudging

4. A multiple classifier system identifies novel cannabinoid CB2 receptor ligands

5. Real-Time Information Security Incident Management: A Case Study Using the IS-CHEC Technique

6. Employee Perspective on Information Security Related Human Error in Healthcare: Proactive Use of IS-CHEC in Questionnaire Form

7. Ontology Fixing by Using Software Engineering Technology

8. A Holistic Cybersecurity Maturity Assessment Framework for Higher Education Institutions in the United Kingdom

9. Addressing consumerization of IT risks with nudging

29. Scenario-based incident response training: lessons learnt from conducting an experiential learning virtual incident response tabletop exercise

34. Addressing consumerization of IT risks with nudging

35. Integrated cybersecurity methodology and supporting tools for healthcare operational information systems

36. AI-based Ethical Hacking for Health Information Systems (HIS): a simulation study

37. Preface

40. Artificial Intelligence–Based Ethical Hacking for Health Information Systems: Simulation Study (Preprint)

41. Automatic knowledge exchange between ontologies and semantic graphs

42. CAESAR8: An agile enterprise architecture approach to managing information security risks

43. Evaluating information security core human error causes (IS-CHEC) technique in public sector and comparison with the private sector

44. Employee Perspective on Information Security Related Human Error in Healthcare: Proactive Use of IS-CHEC in Questionnaire Form

45. Evolutionary Multi-Criterion Optimization : 12th International Conference, EMO 2023, Leiden, The Netherlands, March 20–24, 2023, Proceedings

46. Designing Strong Privacy Metrics Suites Using Evolutionary Optimization

47. Ontology Fixing by Using Software Engineering Technology

50. Cyber Security Decision Making Informed by Cyber Threat Intelligence (CYDETI) : IEEE CNS 20 Poster

Catalog

Books, media, physical & digital resources