572 results on '"Katsikas, Sokratis K."'
Search Results
2. A systematic literature review of how cybersecurity-related behavior has been assessed
3. Dependency-based security risk assessment for cyber-physical systems
4. Introduction to The Elgar Companion to Digital Transformation, Artificial Intelligence and Innovation in the Economy, Society and Democracy
5. A Collaborative Cybersecurity Education Program
6. Using Blockchains to Strengthen the Security of Internet of Things
7. Cyber Insurance and Security Investment Strategy
8. Chapter 104 - Future Trends in Maritime Cybersecurity
9. Chapter 102 - AI Abuse: Investigating the Threat Landscape
10. Chapter 35 - Risk Management
11. Digitalization in Greece: State of Play, Barriers, Challenges, Solutions
12. Tagged Data Breaches in Online Social Networks
13. Towards a secure automatic identification system (AIS)
14. A Collaborative Cybersecurity Education Program
15. Editorial for special issue on security and trust on networked systems
16. A Test-Bed for Intrusion Detection Systems Results Post-processing
17. Uncertainty in Intrusion Detection Signaling Games
18. The Security of Information Systems in Greek Hospitals
19. Security of the Electronic Medical Record
20. Security, Privacy, and Trust Management on Decentralized Systems and Networks.
21. Adaptive MV ARMA Identification Under the Presence of Noise
22. A Survey of Intrusion Detection Systems in Wireless Sensor Networks
23. Contributors
24. Optimized Multi-Domain Secure Interoperation using Soft Constraints
25. How Much Should We Pay for Security? (Invited Paper)
26. An Extension of Typed MSR for Specifying Esoteric Protocols and Their Dolev-Yao Intruder
27. Assuring Critical Information Infrastructure
28. Multivariate AR Model Order Estimation with Unknown Process Order
29. Trust, Privacy and Security in E-Business: Requirements and Solutions
30. Dependency-based security risk assessment for cyber-physical systems
31. Doctoral Programme on ICS Security at the University of the Aegean
32. Enhancing IDS performance through comprehensive alert post-processing
33. A Postgraduate Programme on Information and Communication Systems Security
34. Enhancing SSADM with disaster recovery plan activities
35. An attack detection system for secure computer systems — Outline of the solution
36. The Cascade Vulnerability Problem for Open Distributed Systems: A Review
37. A Test-Bed for Intrusion Detection Systems Results Post-processing
38. Uncertainty in Intrusion Detection Signaling Games
39. Specifying and implementing privacy-preserving cryptographic protocols
40. Partial and Fuzzy Constraint Satisfaction to Support Coalition Formation
41. The Security of Information Systems in Greek Hospitals
42. Risk Management
43. Contributors
44. Guest editorial
45. Joint order and parameter estimation of multivariate autoregressive models using multi-model partitioning theory
46. Risk Management
47. Genetically determined variable structure multiple model estimation
48. Shipping 4.0: Security Requirements for the Cyber-Enabled Ship
49. Contributors to Volume II
50. Contributors to Volume I
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.