A Framework for Competence Development and Assessment in Hybrid Cybersecurity Exercises A Brilingaitė, L Bukauskas, A Juozapavičius Computers & Security 88, 101607, 2019 | 68 | 2019 |
Competency Assessment in Problem-Based Learning Projects of Information Technologies Students. A BRILINGAITĖ, L Bukauskas, A JUŠKEVIČIENĖ Informatics in Education 17 (1), 2018 | 48 | 2018 |
An optimal (k, n) visual secret sharing scheme for information security ME Hodeish, L Bukauskas, VT Humbe Procedia computer science 93, 760-767, 2016 | 24 | 2016 |
3D visual data mining—goals and experiences M Böhlen, L Bukauskas, PS Eriksen, SL Lauritzen, A Mažeika, P Musaeus, ... Computational statistics & data analysis 43 (4), 445-469, 2003 | 22 | 2003 |
Environment for cybersecurity tabletop exercises A Brilingaitė, L Bukauskas, V Krinickij, E Kutka ECGBL 2017 11th European Conference on Game-Based Learning, 47-55, 2017 | 19 | 2017 |
Overcoming information-sharing challenges in cyber defence exercises A Brilingaitė, L Bukauskas, A Juozapavičius, E Kutka Journal of Cybersecurity 8 (1), tyac001, 2022 | 17 | 2022 |
Development of an Educational Platform for Cyber Defence Training A Brilingaitė, L Bukauskas, E Kutka ECCWS 2017 16th European Conference on Cyber Warfare and Security, 73, 2017 | 12 | 2017 |
The Jungle database search engine M Böhlen, L Bukauskas, C Dyreson ACM SIGMOD Record 28 (2), 584-586, 1999 | 10 | 1999 |
Age and gender impact on password hygiene A Juozapavičius, A Brilingaitė, L Bukauskas, RG Lugo Applied Sciences 12 (2), 894, 2022 | 9 | 2022 |
Remapping cybersecurity competences in a small nation state L Bukauskas, A Brilingaitė, A Juozapavičius, D Lepaitė, K Ikamas, ... Heliyon 9 (1), e12808, 2023 | 7 | 2023 |
A New Efficient TKHC-based Image Sharing Scheme over Unsecured Channel ME Hodeish, L Bukauskas, VT Humbe Journal of King Saud University-Computer and Information Sciences 34 (4 …, 2022 | 7 | 2022 |
iTopN: Incremental extraction of the N most visible objects L Bukauskas, L Mark, E Omiecinski, MH Böhlen Proceedings of the twelfth international conference on Information and …, 2003 | 7 | 2003 |
Security aspects of social robots in public spaces: a systematic mapping study SO Oruma, YZ Ayele, F Sechi, H Rødsethol Sensors 23 (19), 8056, 2023 | 6 | 2023 |
Location-based story telling for mobile tourist S Budvytyte, L Bukauskas 2006 7th International Baltic Conference on Databases and Information …, 2006 | 6 | 2006 |
Detection of premeditated security vulnerabilities in mobile applications A Brilingaitė, L Bukauskas, E Kutka ECCWS 2019 18th European Conference on Cyber Warfare and Security, 63, 2019 | 5 | 2019 |
A multidimensional Cyber Defense Exercise: Emphasis on emotional, social, and cognitive aspects K Maennel, A Brilingaitė, L Bukauskas, A Juozapavičius, BJ Knox, ... SAGE Open 13 (1), 21582440231156367, 2023 | 4 | 2023 |
Digital human in cybersecurity risk assessment A Jurevičienė, A Brilingaitė, L Bukauskas International Conference on Human-Computer Interaction, 418-432, 2021 | 4 | 2021 |
Observer relative data extraction L Bukauskas, MH Böhlen Observer Relative Data Extraction, 2001 | 4 | 2001 |
Test-data generation and integration for long-distance e-vehicle routing A Barauskas, A Brilingaitė, L Bukauskas, V Čeikutė, A Čivilis, S Šaltenis GeoInformatica 27 (4), 737-758, 2023 | 3 | 2023 |
Cyber security table-top exercise gamification with dynamic scenario for qualification assessment G Kvietinskaitė, L Bukauskas, V Krinickij International Conference on Human-Computer Interaction, 54-62, 2022 | 3 | 2022 |