Artículos con órdenes de acceso público - Helge JanickeMás información
No disponible en ningún lugar: 1
Security Revisited: Honeytokens meet Google Authenticator
V Papaspirou, M Papathanasaki, L Maglaras, I Kantzavelou, C Douligeris, ...
2022 7th South-East Europe Design Automation, Computer Engineering, Computer …, 2022
Órdenes: European Commission
Disponibles en algún lugar: 14
Route optimization of electric vehicles based on dynamic wireless charging
D Kosmanos, LA Maglaras, M Mavrovouniotis, S Moschoyiannis, ...
IEEe Access 6, 42551-42565, 2018
Órdenes: UK Research & Innovation
A novel intrusion detection system against spoofing attacks in connected electric vehicles
D Kosmanos, A Pappas, L Maglaras, S Moschoyiannis, ...
Array 5, 100013, 2020
Órdenes: UK Engineering and Physical Sciences Research Council, European Commission
Employee perspective on information security related human error in healthcare: Proactive use of IS-CHEC in questionnaire form
M Evans, Y He, C Luo, I Yevseyeva, H Janicke, LA Maglaras
IEEE Access 7, 102087-102101, 2019
Órdenes: National Natural Science Foundation of China
A novel two-factor honeytoken authentication mechanism
V Papaspirou, L Maglaras, MA Ferrag, I Kantzavelou, H Janicke, ...
2021 International Conference on Computer Communications and Networks (ICCCN …, 2021
Órdenes: European Commission
A nis directive compliant cybersecurity maturity assessment framework
G Drivas, A Chatzopoulou, L Maglaras, C Lambrinoudakis, A Cook, ...
2020 IEEE 44th Annual Computers, Software, and Applications Conference …, 2020
Órdenes: European Commission
Real-time information security incident management: a case study using the IS-CHEC technique
M Evans, Y He, C Luo, I Yevseyeva, H Janicke, E Zamani, LA Maglaras
IEEE Access 7, 142147-142175, 2019
Órdenes: National Natural Science Foundation of China
Formality, Agility, Security, and Evolution in Software Development.
JP Bowen, M Hinchey, H Janicke, MP Ward, H Zedan
Computer 47 (10), 86-89, 2014
Órdenes: Science Foundation Ireland
A practical approach to protect IoT devices against attacks and compile security incident datasets
B Cruz, S Gomez-Meire, D Ruano-Ordás, H Janicke, I Yevseyeva, ...
Scientific Programming 2019 (1), 9067512, 2019
Órdenes: Gobierno de España
Industrial internet of things (I2oT)
L Maglaras, L Shu, A Maglaras, J Jiang, H Janicke, D Katsaros, TJ Cruz
Mobile Networks and Applications 23, 806-808, 2018
Órdenes: UK Engineering and Physical Sciences Research Council
SEQUIN: a grammar inference framework for analyzing malicious system behavior
R Luh, G Schramm, M Wagner, H Janicke, S Schrittwieser
Journal of Computer Virology and Hacking Techniques 14, 291-311, 2018
Órdenes: Austrian Science Fund
Security defense strategy for intelligent medical diagnosis systems (IMDS)
C Luo, H Soygazi, H Janicke, Y He
2019 41st Annual International Conference of the IEEE Engineering in …, 2019
Órdenes: National Natural Science Foundation of China
A novel authentication method that combines honeytokens and Google authenticator
V Papaspirou, M Papathanasaki, L Maglaras, I Kantzavelou, C Douligeris, ...
Information 14 (7), 386, 2023
Órdenes: European Commission
Enhancing cybersecurity training efficacy: A comprehensive analysis of gamified learning, behavioral strategies and digital twins
Y Yigit, K Kioskli, L Bishop, N Chouliaras, L Maglaras, H Janicke
2024 IEEE 25th international symposium on a world of wireless, Mobile and …, 2024
Órdenes: European Commission
Assessing Cyber Security Threats and Risks in the Public Sector of Greece
G Drivas, L Maglaras, H Janicke, S Ioannidis
Journal of Information Warfare 19 (1), 96-112, 2020
Órdenes: European Commission
La información de publicación y financiación se determina de forma automática mediante un programa informático