Zobrazeno 1 - 10
of 18
pro vyhledávání: '"Sakshyam Panda"'
Publikováno v:
IEEE Access, Vol 11, Pp 44467-44481 (2023)
Assessing and controlling cyber risk is the cornerstone of information security management, but also a formidable challenge for organisations due to the uncertainties associated with attacks, the resulting risk exposure, and the availability of scarc
Externí odkaz:
https://doaj.org/article/7d9a52dc61a24e49901fa7382da1e0d3
Autor:
Elina Argyridou, Sokratis Nifakos, Christos Laoudias, Sakshyam Panda, Emmanouil Panaousis, Krishna Chandramouli, Diana Navarro-Llobet, Juan Mora Zamorano, Panagiotis Papachristou, Stefano Bonacina
Publikováno v:
Journal of Medical Internet Research, Vol 25, p e41294 (2023)
BackgroundCyber threats are increasing across all business sectors, with health care being a prominent domain. In response to the ever-increasing threats, health care organizations (HOs) are enhancing the technical measures with the use of cybersecur
Externí odkaz:
https://doaj.org/article/15b97ea3859d47649186d14ff69aa3c3
Autor:
Sakshyam Panda, Stefan Rass, Sotiris Moschoyiannis, K. Liang, George Loukas, Emmanouil Panaousis
Publikováno v:
IEEE Access, Vol 10, Pp 104671-104685 (2022)
The Internet of Vehicles (IoV), whereby interconnected vehicles that communicate with each other and with road infrastructure on a common network, has promising socio-economic benefits but also poses new cyber-physical threats. To protect these entit
Externí odkaz:
https://doaj.org/article/fcb226e538cc4d55b9b343b39346a3e9
Autor:
Ioannis Kalderemidis, Aristeidis Farao, Panagiotis Bountakas, Sakshyam Panda, Christos Xenakis
Publikováno v:
Proceedings of the 17th International Conference on Availability, Reliability and Security.
Investments on cybersecurity are essential for organizations to protect operational activities, develop trust relationships with clients, and maintain financial stability. A cybersecurity breach can lead to financial losses as well as to damage the r
Publikováno v:
Proceedings of the 17th International Conference on Availability, Reliability and Security.
Autor:
Elina Argyridou, Sokratis Nifakos, Christos Laoudias, Sakshyam Panda, Emmanouil Panaousis, Krishna Chandramouli, Diana Navarro-Llobet, Juan Mora Zamorano, Panagiotis Papachristou, Stefano Bonacina
Publikováno v:
Journal of Medical Internet Research.
BACKGROUND Cyber threats are increasing across all business sectors and the cost of cybersecurity and data privacy incidents is rising globally with healthcare being a prominent domain. In response to the ever-increasing threats, healthcare organisat
Autor:
Stefan Rass, Sotiris Moschoyiannis, EMMANOUIL PANAOUSIS, George Loukas, Sakshyam Panda, Kaitai Liang
The Internet of Vehicles (IoV), whereby interconnected vehicles communicate with each other and with road infrastructure on a common network, has promising socio-economic benefits but also poses new cyber-physical threats. Data on vehicular attackers
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::c2913c457a3a814a0296598a4bda8845
http://arxiv.org/abs/2111.02364
http://arxiv.org/abs/2111.02364
Insurance, in general, is a financial contract between the one buying the insurance (also known as the policyholder or insured) and the one providing insurance (known as insurance carrier or insurer). The contract, known as the insurance policy, typi
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::2483f442d31e4f41722750d044e7c073
Publikováno v:
Lecture Notes in Computer Science
Lecture Notes in Computer Science-From Lambda Calculus to Cybersecurity Through Program Analysis
From Lambda Calculus to Cybersecurity Through Program Analysis ISBN: 9783030411022
From Lambda Calculus to Cybersecurity Through Program Analysis
From Lambda Calculus to Cybersecurity Through Program Analysis-Essays Dedicated to Chris Hankin on the Occasion of His Retirement
Lecture Notes in Computer Science-From Lambda Calculus to Cybersecurity Through Program Analysis
From Lambda Calculus to Cybersecurity Through Program Analysis ISBN: 9783030411022
From Lambda Calculus to Cybersecurity Through Program Analysis
From Lambda Calculus to Cybersecurity Through Program Analysis-Essays Dedicated to Chris Hankin on the Occasion of His Retirement
Cyber hygiene measures are often recommended for strengthening an organization’s security posture, especially for protecting against social engineering attacks that target the human element. However, the related recommendations are typically the sa
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::ba2de1fcd10e948f2c446f64cd396a4d
https://zenodo.org/record/4441672
https://zenodo.org/record/4441672
Publikováno v:
Computers & Security
We introduce a game-theoretic model to investigate the strategic interaction between a cyber insurance policyholderwhose premium depends on her self-reported security level and an insurer with the power to audit the security levelupon receiving an in
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::f2cefde5b604571ae88e15384be55c24