Zobrazeno 1 - 10
of 65
pro vyhledávání: '"Nineta Polemi"'
Publikováno v:
Frontiers in Big Data, Vol 7 (2024)
This paper addresses the critical gaps in existing AI risk management frameworks, emphasizing the neglect of human factors and the absence of metrics for socially related or human threats. Drawing from insights provided by NIST AI RFM and ENISA, the
Externí odkaz:
https://doaj.org/article/9040bc2182f0402e80ff912e115ae049
Autor:
Pinelopi Kyranoudi, Nineta Polemi
Publikováno v:
Frontiers in Computer Science, Vol 5 (2023)
This paper argues that small and medium sized ports (SMPs) are as important as larger ones in terms of supply chain service (SCS) management and security, as they can become the weakest links for national and European Union (EU) resilience and securi
Externí odkaz:
https://doaj.org/article/0ed19bf3ec12420aa8ed2801d7b3869a
Publikováno v:
Applied Sciences, Vol 8, Iss 9, p 1477 (2018)
In recent years maritime logistics infrastructures are the global links among societies and economies. This challenges adversaries to intrude on the cyber-dependent ICTs by performing high-level intelligent techniques. A potential cyber-attack on suc
Externí odkaz:
https://doaj.org/article/97c32d41ae3a443694d31ad85a3023b7
The current crisis (climate change, COVID-19 pandemic outbreak, Russia’s invasion of Ukraine) has led to serious atrocities, and umanitarian and financial disasters to societies and industries; our critical infrastructures, systems and operations b
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::9abfe13809abaced72d24680a5977f27
Autor:
Pinelopi Kyranoudi, Nineta Polemi
This study focuses on explaining key concepts about ports, their characteristics (e.g., size, operational field, infrastruc-ture), potential threats (e.g., interception of sensitive infor-mation, illegal access, terrorism) and attacks (cyber, physi-c
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::591a546855fb6221f9e77e4378ca7a41
Autor:
Alexandra Michota, Nineta Polemi
Publikováno v:
2022 IEEE International Conference on Cyber Security and Resilience (CSR).
Autor:
Jlenia Puma, Julien Mascolo, Sofoklis Efremidis, Eleni-Maria Kalogeraki, Fabio De Donato, Cristiano Casadei, Danijela Boberic Krsticev, Alexandra Michota, Nineta Polemi, Nikos Argyropoulos, Manolis Chatzimpyrros, Haralambos Mouratidis, Gregory Chrysos, Farhan Sahito, Pablo Giménez Salazar, Norma Zanetti, Sophia Karagiorgou
The objective of this deliverable is to report the results of the activities performed in the first phase of CYRENE’s Work Package 2. The main output is related to the requirements that have been collected from relevant standards and literature rev
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::6a44a592146cdc9d789159c663053662
Secure messaging is very important especially in critical applications like communication of automated cars. In this article we present a simulation of a blockchain messaging platform based on the Bitcoin protocol. The mechanism can be used for excha
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::d9f20db95a28c47831620cbfe997b983
https://dora.dmu.ac.uk/handle/2086/21418
https://dora.dmu.ac.uk/handle/2086/21418
Publikováno v:
Learning and Analytics in Intelligent Systems ISBN: 9783030411954
In this paper, we present challenges and risks concerning cyber security in a supply chain environment. In particular, we focus on the MITIGATE (Multidimensional, IntegraTed, rIsk assessment framework and dynamic, collaborative risk manaGement tools
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::8cf64267671be156dcde9c80cd55ac5d
https://doi.org/10.1007/978-3-030-41196-1_7
https://doi.org/10.1007/978-3-030-41196-1_7
Autor:
Nineta Polemi, Kitty Kioskli
Publikováno v:
2020 15th International Conference for Internet Technology and Secured Transactions (ICITST)
ICITST
ICITST
Cyber risk assessment standards and methodologies do not consider psychological, social and behavioural parameters in their classifications of the attackers' types, profiles, and competencies. In this paper, we present a holistic, multidimensional ap