References
Cyber Security Body of Knowledge In IEEE 7th International Symposium on Cloud and Service Computing., 2018.
Cyber Security and Resilience of Modern Societies: A Research Management Architecture." Information & Security: An International Journal 38 (2017): 93-108. "
From Information Security to Cyber Security." Computers & Security 38 (2013): 97-102. "
Main considerations in elaborating organizational information security policies In 20th International Conference on Computer Systems and Technologies, CompSysTech 2019. Vol. ACM International Conference Proceeding Series. Bulgaria: University of RuseRuse, 2019.
Defining Organizational Information Security Culture – Perspectives from Academia and Industry." Computers & Security (2020). "
RPiDS: Raspberry Pi IDS - A Fruitful Intrusion Detection System for IoT In Intl IEEE Conferences on Ubiquitous Intelligence & Computing, Advanced and Trusted Computing, Scalable Computing and Communications, Cloud and Big Data Compu-ting, Internet of People, and Smart World Congress., 2016.
An Attack Surface Metric." IEEE Transactions on Software Engineering 37, no. 3 (2011): 371-386. "
Review of Cybersecurity Research Topics, Taxonomy and Challenges: Interdisciplinary Perspective In IEEE 12th Conference on Service-Oriented Computing and Applications. Kaohsiung, Taiwan, 2019.
From Cybersecurity to Collaborative Resiliency In 2016 ACM Workshop on Automated Decision Making for Active Cyber Defense SafeConfig’16. Vienna, 2016.
Power of Communication Behind Extreme Cybersecurity Incidents In 2019 IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf on Pervasive Intelligence and Computing, Intl Conf on Cloud and Big Data Computing, Intl Conf on Cyber Science and Technology Congress., 2019.
Survey of Intrusion Detection Systems Leveraging Host Data." ACM Comput. Surv. 52, no. 6 (2020). "
An ANN Based Sequential Detection Method for Balancing Performance Indicators of IDS In Seventh International Symposium on Computing and Networking (CANDAR). Nagasaki, Japan, 2017.
Understanding Modern Intrusion Detection Systems: A Survey." arXiv:1708.07174 (2017). "
Review: Intrusion detection system: A comprehensive review." Journal of Network and Computer Applications (2013). "
"Kubernetes scalability and performance SLIs/SLOs." GitHub (2020).
Cyber Threat Map for National and Sectoral Analysis In Computer and Communications Engineering, Workshop on Information Security 2019, 9th Balkan Conference in Informatics., 2019.
Vulnerability Analysis of Content Management Systems to SQL Injection Using SQLMAP." In IEEE, SoutheastCon 2018 . St. Petersburg, FL, USA, 2018. "
Deliver Uncompromised: A Strategy for Supply Chain Security and Resilience. Washington, DC: MITRE, 2019.
An Adaptive Supply Chain Cyber Risk Management Methodology In Hamburg International Conference on Logistics, Project: MITIGATE., 2017.