116 results on '"Papastergiou, Spyridon"'
Search Results
2. Synthetic Data Generation and Impact Analysis of Machine Learning Models for Enhanced Credit Card Fraud Detection
3. Cyber threat assessment and management for securing healthcare ecosystems using natural language processing
4. Cyber Security Incident Handling, Warning and Response System for the European Critical Information Infrastructures (CyberSANE)
5. A Conceptual Model for Data-Driven Threat Analysis for Enhancing Cyber Security
6. From product recommendation to cyber-attack prediction: Generating attack graphs and predicting future attacks
7. Cyber Supply Chain Threat Analysis and Prediction Using Machine Learning and Ontology
8. Challenges and Issues in Risk Assessment in Modern Maritime Systems
9. Swarm Intelligence Model for Securing Healthcare Ecosystem
10. Handling of advanced persistent threats and complex incidents in healthcare, transportation and energy ICT infrastructures
11. Adoption of Deep-Learning Models for Managing Threat in API Calls with Transparency Obligation Practice for Overall Resilience.
12. Cyber Security Incident Handling, Warning and Response System for the European Critical Information Infrastructures (CyberSANE)
13. Integrating Human Factors into Data-driven Threat Management for Overall Security Enhancement
14. A Self-Organized Swarm Intelligence Solution for Healthcare ICT Security
15. From product recommendation to cyber-attack prediction: generating attack graphs and predicting future attacks
16. Assessing the Risk of Ports and Their Supply Chains: The CYSM, MEDUSA, and MITIGATE Approaches
17. Modeling SCADA Attacks
18. MITIGATE: A Dynamic Supply Chain Cyber Risk Assessment Methodology
19. Exploring Cyber-Security Issues in Vessel Traffic Services
20. Cyber threat assessment and management for securing healthcare ecosystems using natural language processing
21. Challenges and Issues in Risk Assessment in Modern Maritime Systems
22. Cyber Security Incident Handling, Warning and Response System for the European Critical Information Infrastructures (CyberSANE)
23. Business and Threat Analysis of Ports’ Supply Chain Services
24. CYSM: An Innovative Physical/Cyber Security Management System for Ports
25. A Swarm Artificial Intelligence Approach for Effective Treatment of Chronic Conditions
26. Information Sharing for Creating Awareness for Securing Healthcare Ecosystem
27. Exploring Cyber-Security Issues in Vessel Traffic Services
28. A Machine Learning Approach for the NLP-Based Analysis of Cyber Threats and Vulnerabilities of the Healthcare Ecosystem
29. A Swarm-Based Clinical Validation Framework of Artificial Intelligence Solutions for Non-Communicable Diseases
30. Modeling SCADA Attacks
31. MITIGATE: A Dynamic Supply Chain Cyber Risk Assessment Methodology
32. SWEB: An Advanced Mobile Residence Certificate Service
33. Assessing the Risk of Ports and Their Supply Chains: The CYSM, MEDUSA, and MITIGATE Approaches
34. A Secure e-Ordering Web Service
35. Vulnerability prediction for secure healthcare supply chain service delivery
36. Cyber Threat Analysis Using Natural Language Processing for a Secure Healthcare System
37. Cyberattack Path Generation and Prioritisation for Securing Healthcare Systems
38. An Attack Simulation and Evidence Chains Generation Model for Critical Information Infrastructures
39. A Dynamic Cyber Security Situational Awareness Framework for Healthcare ICT Infrastructures
40. Integrating and Validating Maritime Transport Security Services: Initial results from the CS4EU demonstrator
41. A Testing Process for Interoperability and Conformance of Secure Web Services
42. SWEB: An Advanced Mobile Residence Certificate Service
43. Handling of advanced persistent threats and complex incidents in healthcare, transportation and energy ICT infrastructures
44. Deliverable D7.1 - Evaluation Methodology
45. A Novel Risk Assessment Methodology for SCADA Maritime Logistics Environments
46. Knowledge management methodology for identifying threats in maritime/logistics supply chains
47. From product recommendation to cyber-attack prediction: generating attack graphs and predicting future attacks
48. Design and validation of the Medusa supply chain risk assessment methodology and system
49. Design and validation of the Medusa supply chain risk assessment methodology and system
50. A Testing Process for Interoperability and Conformance of Secure Web Services
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.