Ai4HealthSec Requirements and Research Analysis
WP2 conducted a requirements analysis of the Healthcare related CS domain
Ai4HealthSec Requirements and Research Analysis Read More »
WP2 conducted a requirements analysis of the Healthcare related CS domain
Ai4HealthSec Requirements and Research Analysis Read More »
Kure, H.I., Islam, S. & Mouratidis, H. An integrated cyber security risk management framework and risk predication for the critical infrastructure protection. Neural Computing & Application, 34, 15241–15271 (2022). https://doi.org/10.1007/s00521-022-06959-2
Kure, H. I., Islam, S., & Mouratidis, H. (2022). An integrated cyber security risk management framework and risk predication for the critical infrastructure protection. Neural Computing and Applications, 34(18), 15241-15271. http://doi.org/10.1007/s00521-022-06959-2
Ciampi, M., Romano, D., & Schmid, G. (2022). Process Authentication through Blockchain: Three Case Studies. Cryptography, 6(4), 58. http://doi.org/10.3390/cryptography6040058
Process Authentication through Blockchain: Three Case Studies Read More »
Silvestri, S., Gargiulo, F., & Ciampi, M. (2022). Iterative annotation of biomedical ner corpora with deep neural networks and knowledge bases. Applied Sciences, 12(12), 5775. http://doi.org/10.3390/app12125775
Kioskli, K., Dellagiacoma, D., Fotis, T., & Mouratidis, H. (2022). The supply chain of a Living Lab: Modelling security, privacy, and vulnerability issues alongside with their impact and potential mitigation strategies. Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications, 13(2), 147-182. http://doi.org/10.22667/JOWUA.2022.06.30.147
Islam, S., Abba, A., Ismail, U., Mouratidis, H., & Papastergiou, S. (2022). Vulnerability prediction for secure healthcare supply chain service delivery. Integrated Computer-Aided Engineering, (Preprint), 1-21.http://doi.org/10.3233/ICA-220689
Vulnerability prediction for secure healthcare supply chain service delivery Read More »
Ciampi, M., Sicuranza, M., & Silvestri, S. (2022). A privacy-preserving and standard-based architecture for secondary use of clinical data. Information, 13(2), 87. http://doi.org/10.3390/info13020087
A Privacy-Preserving and Standard-Based Architecture for Secondary Use of Clinical Data Read More »
Kioskli, K., Polemi, N. (2022). Estimating Attackers’ Profiles Results in More Realistic Vulnerability Severity Scores. In: Tareq Ahram and Waldemar Karwowski (eds) Human Factors in Cybersecurity. AHFE (2022) International Conference. AHFE Open Access, vol 53. AHFE International, USA.http://doi.org/10.54941/ahfe1002211
Estimating Attackers’ Profiles Results in More Realistic Vulnerability Severity Scores Read More »
Islam, S., Papastergiou, S., Kalogeraki, E. M., & Kioskli, K. (2022). Cyberattack path generation and prioritisation for securing healthcare systems. Applied Sciences, 12(9), 4443. http://doi.org/10.3390/app12094443
Cyberattack path generation and prioritisation for securing healthcare systems Read More »