Zobrazeno 1 - 4
of 4
pro vyhledávání: '"Tsakirakis, George"'
Autor:
Lampropoulos, Konstantinos, Zarras, Apostolis, Lakka, Eftychia, Barmpaki, Polyanthi, Drakonakis, Kostas, Athanatos, Manos, Debar, Herve, Alexopoulos, Andreas, Sotiropoulos, Aristeidis, Tsakirakis, George, Dimakopoulos, Nikos, Tsolovos, Dimitris, Pocs, Matthias, Smyrlis, Michalis, Basdekis, Ioannis, Spanoudakis, Georgios, Mihaila, Ovidiu, Prelipcean, Bogdan, Salant, Eliot, Athanassopoulos, Sotiris, Papachristou, Petros, Ladakis, Ioannis, Chang, John, Floros, Evangelos, Smyrlis, Konstantinos, Besters, Rouven, Randine, Pietro, Lovaas, Karianna Fjeld, Cooper, John, Ilie, Iulia, Danciu, Gabriel, Khabbaz, Marwan Darwish
The healthcare sector is increasingly vulnerable to cyberattacks due to its growing digitalization. Patient data, including medical records and financial information, are at risk, potentially leading to identity theft and patient safety concerns. The
Externí odkaz:
http://arxiv.org/abs/2310.10139
Autor:
Tsakirakis, George, Rodosthenous, Panagiotis, Dimakopoulos, Nikos, Gavrilut, Dragos, Prelipcean, Bogdan, Ilie, Iulia, Alexopoulos, Andreas, Kalipollitis, Leonidas, Smyrlis, Michail, Khabbaz, Marwan
This deliverable provides a conceptual specification of the HEIR framework architecture and deployment. It presents the current status of the implementation of the HEIR modules grouped into three architecture layers, namely, the Technology Facilitato
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::5179e19274342a1fcd4e9571f80b7cbb
Autor:
Tsakirakis, George, Rodosthenous, Panagiotis, Dragos, Gavrilut, Bogdan, Prelipcean, Ilie, Iulia, Alexopoulos, Andreas, Kalipollitis, Leonidas
This deliverable focuses on the continuous integration towards the realisation of the HEIR framework. The overall architecture of the MVP is described accompanied by a short description of the individual components that were developed and deployed in
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::3d0bc9237db9e27d3d61a5a63c2a232e
Autor:
Hatzivasilis George, Sotirios, Ioannidis Sotirios, Smyrlis Michail, Spanoudakis, George, Frati Fulvio, Goeke Ludger, Hildebrandt Torsten, Tsakirakis George, Oikonomou Fotis, Leftheriotis George, Koshutanski Hristo
Publikováno v:
Applied Sciences
Volume 10
Issue 16
Applied Sciences, Vol 10, Iss 5702, p 5702 (2020)
Volume 10
Issue 16
Applied Sciences, Vol 10, Iss 5702, p 5702 (2020)
Nowadays, more-and-more cyber-security training is emerging as an essential process for the lifelong personnel education in organizations, especially for those which operate critical infrastructures. This is due to security breaches on popular servic