Segui
Sakshyam Panda
Sakshyam Panda
Centre for Sustainable Cyber Security (CS2), University of Greenwich
Email verificata su greenwich.ac.uk - Home page
Titolo
Citata da
Citata da
Anno
MITRE ATT&CK-driven cyber risk assessment
M Ahmed, S Panda, C Xenakis, E Panaousis
Proceedings of the 17th International Conference on Availability …, 2022
302022
Optimizing investments in cyber hygiene for protecting healthcare users
S Panda, E Panaousis, G Loukas, C Laoudias
From Lambda Calculus to Cybersecurity Through Program Analysis: Essays …, 2020
232020
SECONDO: A platform for cybersecurity investments and cyber insurance decisions
A Farao, S Panda, SA Menesidou, E Veliou, N Episkopos, ...
Trust, Privacy and Security in Digital Business: 17th International …, 2020
222020
Post-incident audits on cyber insurance discounts
S Panda, DW Woods, A Laszka, A Fielder, E Panaousis
Computers & Security 87, 101593, 2019
222019
HoneyCar: a framework to configure honeypot vulnerabilities on the internet of vehicles
S Panda, S Rass, S Moschoyiannis, K Liang, G Loukas, E Panaousis
IEEE Access 10, 104671-104685, 2022
212022
Honeypot type selection games for smart grid networks
N Boumkheld, S Panda, S Rass, E Panaousis
Decision and Game Theory for Security: 10th International Conference …, 2019
182019
GTM: Game Theoretic Methodology for optimal cybersecurity defending strategies and investments
I Kalderemidis, A Farao, P Bountakas, S Panda, C Xenakis
Proceedings of the 17th International Conference on Availability …, 2022
162022
Cyber-insurance: Past, present and future
S Panda, A Farao, E Panaousis, C Xenakis
Encyclopedia of Cryptography, Security and Privacy, 1-4, 2021
112021
Optimising user security recommendations for AI-powered smart-homes
E Scott, S Panda, G Loukas, E Panaousis
2022 IEEE Conference on Dependable and Secure Computing (DSC), 1-8, 2022
82022
Behavioural Modelling of Attackers' Choices
S Panda, I Oliver, S Holtmanns
Safety and Reliability–Safe Societies in a Changing World: Proceedings of …, 2018
72018
Modelling nfv concepts with ontologies
I Oliver, S Panda, K Wang, A Kalliola
2018 21st Conference on Innovation in Clouds, Internet and Networks and …, 2018
72018
Sok: The mitre att&ck framework in research and practice
S Roy, E Panaousis, C Noakes, A Laszka, S Panda, G Loukas
arXiv preprint arXiv:2304.07411, 2023
62023
Cyber hygiene methodology for raising cybersecurity and data privacy awareness in health care organizations: Concept study
E Argyridou, S Nifakos, C Laoudias, S Panda, E Panaousis, ...
Journal of Medical Internet Research 25, e41294, 2023
42023
Principled data-driven decision support for cyber-forensic investigations
S Atefi, S Panda, E Panaousis, A Laszka
Proceedings of the AAAI Conference on Artificial Intelligence 37 (4), 5010-5017, 2023
32023
Cyber Risk Assessment and Optimisation: A Small Business Case Study
M Tsiodra, S Panda, M Chronopoulos, E Panaousis
IEEE Access, 2023
32023
INCHAIN: a cyber insurance architecture with smart contracts and self-sovereign identity on top of blockchain
A Farao, G Paparis, S Panda, E Panaousis, A Zarras, C Xenakis
International Journal of Information Security 23 (1), 347-371, 2024
12024
Privacy impact assessment of cyber attacks on connected and autonomous vehicles
S Panda, E Panaousis, G Loukas, K Kentrotis
Proceedings of the 18th International Conference on Availability …, 2023
12023
Modelling Telecommunications Operators and Adversaries using Game Theory
S Panda
12018
A Game Theoretic Model for Understanding and Modelling Cybersecurity for Telecommunications Operators
I Oliver, S Panda, S Moschoyiannis
The 29th European Conference on Reliability and Safety (ESREL), 123-129, 2020
2020
Il sistema al momento non può eseguire l'operazione. Riprova più tardi.
Articoli 1–19