Seguir
Sakshyam Panda
Sakshyam Panda
Centre for Sustainable Cyber Security (CS2), University of Greenwich
Email confirmado em greenwich.ac.uk - Página inicial
Título
Citado por
Citado por
Ano
MITRE ATT&CK-driven cyber risk assessment
M Ahmed, S Panda, C Xenakis, E Panaousis
Proceedings of the 17th International Conference on Availability …, 2022
422022
HoneyCar: a framework to configure honeypot vulnerabilities on the internet of vehicles
S Panda, S Rass, S Moschoyiannis, K Liang, G Loukas, E Panaousis
IEEE Access 10, 104671-104685, 2022
302022
Optimizing investments in cyber hygiene for protecting healthcare users
S Panda, E Panaousis, G Loukas, C Laoudias
From Lambda Calculus to Cybersecurity Through Program Analysis: Essays …, 2020
272020
SECONDO: A platform for cybersecurity investments and cyber insurance decisions
A Farao, S Panda, SA Menesidou, E Veliou, N Episkopos, ...
Trust, Privacy and Security in Digital Business: 17th International …, 2020
252020
Post-incident audits on cyber insurance discounts
S Panda, DW Woods, A Laszka, A Fielder, E Panaousis
Computers & Security 87, 101593, 2019
242019
Honeypot type selection games for smart grid networks
N Boumkheld, S Panda, S Rass, E Panaousis
Decision and Game Theory for Security: 10th International Conference …, 2019
222019
GTM: Game Theoretic Methodology for optimal cybersecurity defending strategies and investments
I Kalderemidis, A Farao, P Bountakas, S Panda, C Xenakis
Proceedings of the 17th International Conference on Availability …, 2022
202022
Sok: The mitre att&ck framework in research and practice
S Roy, E Panaousis, C Noakes, A Laszka, S Panda, G Loukas
arXiv preprint arXiv:2304.07411, 2023
142023
Cyber-insurance: Past, present and future
S Panda, A Farao, E Panaousis, C Xenakis
Encyclopedia of Cryptography, Security and Privacy, 1-4, 2021
132021
Cyber hygiene methodology for raising cybersecurity and data privacy awareness in health care organizations: Concept study
E Argyridou, S Nifakos, C Laoudias, S Panda, E Panaousis, ...
Journal of Medical Internet Research 25, e41294, 2023
122023
Cyber risk assessment and optimization: A small business case study
M Tsiodra, S Panda, M Chronopoulos, E Panaousis
IEEE Access 11, 44467-44481, 2023
122023
INCHAIN: a cyber insurance architecture with smart contracts and self-sovereign identity on top of blockchain
A Farao, G Paparis, S Panda, E Panaousis, A Zarras, C Xenakis
International Journal of Information Security 23 (1), 347-371, 2024
92024
Optimising user security recommendations for AI-powered smart-homes
E Scott, S Panda, G Loukas, E Panaousis
2022 IEEE Conference on Dependable and Secure Computing (DSC), 1-8, 2022
92022
Behavioural Modelling of Attackers' Choices
S Panda, I Oliver, S Holtmanns
Safety and Reliability–Safe Societies in a Changing World: Proceedings of …, 2018
82018
Modelling nfv concepts with ontologies
I Oliver, S Panda, K Wang, A Kalliola
2018 21st Conference on Innovation in Clouds, Internet and Networks and …, 2018
72018
Privacy impact assessment of cyber attacks on connected and autonomous vehicles
S Panda, E Panaousis, G Loukas, K Kentrotis
Proceedings of the 18th International Conference on Availability …, 2023
42023
Principled data-driven decision support for cyber-forensic investigations
S Atefi, S Panda, E Panaousis, A Laszka
Proceedings of the AAAI Conference on Artificial Intelligence 37 (4), 5010-5017, 2023
32023
Modelling Telecommunications Operators and Adversaries using Game Theory
S Panda
12018
A Game Theoretic Model for Understanding and Modelling Cybersecurity for Telecommunications Operators
I Oliver, S Panda, S Moschoyiannis
The 29th European Conference on Reliability and Safety (ESREL), 123-129, 2020
2020
O sistema não pode efectuar a operação agora. Tente mais tarde.
Artigos 1–19