MITRE ATT&CK-driven cyber risk assessment M Ahmed, S Panda, C Xenakis, E Panaousis Proceedings of the 17th International Conference on Availability …, 2022 | 35 | 2022 |
Optimizing investments in cyber hygiene for protecting healthcare users S Panda, E Panaousis, G Loukas, C Laoudias From Lambda Calculus to Cybersecurity Through Program Analysis: Essays …, 2020 | 24 | 2020 |
HoneyCar: a framework to configure honeypot vulnerabilities on the internet of vehicles S Panda, S Rass, S Moschoyiannis, K Liang, G Loukas, E Panaousis IEEE Access 10, 104671-104685, 2022 | 23 | 2022 |
Post-incident audits on cyber insurance discounts S Panda, DW Woods, A Laszka, A Fielder, E Panaousis Computers & Security 87, 101593, 2019 | 23 | 2019 |
SECONDO: A platform for cybersecurity investments and cyber insurance decisions A Farao, S Panda, SA Menesidou, E Veliou, N Episkopos, ... Trust, Privacy and Security in Digital Business: 17th International …, 2020 | 22 | 2020 |
Honeypot type selection games for smart grid networks N Boumkheld, S Panda, S Rass, E Panaousis Decision and Game Theory for Security: 10th International Conference …, 2019 | 20 | 2019 |
GTM: Game Theoretic Methodology for optimal cybersecurity defending strategies and investments I Kalderemidis, A Farao, P Bountakas, S Panda, C Xenakis Proceedings of the 17th International Conference on Availability …, 2022 | 17 | 2022 |
Cyber-insurance: Past, present and future S Panda, A Farao, E Panaousis, C Xenakis Encyclopedia of Cryptography, Security and Privacy, 1-4, 2021 | 11 | 2021 |
Sok: The mitre att&ck framework in research and practice S Roy, E Panaousis, C Noakes, A Laszka, S Panda, G Loukas arXiv preprint arXiv:2304.07411, 2023 | 8 | 2023 |
Optimising user security recommendations for AI-powered smart-homes E Scott, S Panda, G Loukas, E Panaousis 2022 IEEE Conference on Dependable and Secure Computing (DSC), 1-8, 2022 | 8 | 2022 |
Behavioural Modelling of Attackers' Choices S Panda, I Oliver, S Holtmanns Safety and Reliability–Safe Societies in a Changing World: Proceedings of …, 2018 | 7 | 2018 |
Modelling nfv concepts with ontologies I Oliver, S Panda, K Wang, A Kalliola 2018 21st Conference on Innovation in Clouds, Internet and Networks and …, 2018 | 7 | 2018 |
Cyber hygiene methodology for raising cybersecurity and data privacy awareness in health care organizations: Concept study E Argyridou, S Nifakos, C Laoudias, S Panda, E Panaousis, ... Journal of Medical Internet Research 25, e41294, 2023 | 4 | 2023 |
Cyber Risk Assessment and Optimisation: A Small Business Case Study M Tsiodra, S Panda, M Chronopoulos, E Panaousis IEEE Access, 2023 | 4 | 2023 |
INCHAIN: a cyber insurance architecture with smart contracts and self-sovereign identity on top of blockchain A Farao, G Paparis, S Panda, E Panaousis, A Zarras, C Xenakis International Journal of Information Security 23 (1), 347-371, 2024 | 3 | 2024 |
Principled data-driven decision support for cyber-forensic investigations S Atefi, S Panda, E Panaousis, A Laszka Proceedings of the AAAI Conference on Artificial Intelligence 37 (4), 5010-5017, 2023 | 3 | 2023 |
Privacy impact assessment of cyber attacks on connected and autonomous vehicles S Panda, E Panaousis, G Loukas, K Kentrotis Proceedings of the 18th International Conference on Availability …, 2023 | 2 | 2023 |
Modelling Telecommunications Operators and Adversaries using Game Theory S Panda | 1 | 2018 |
A Game Theoretic Model for Understanding and Modelling Cybersecurity for Telecommunications Operators I Oliver, S Panda, S Moschoyiannis The 29th European Conference on Reliability and Safety (ESREL), 123-129, 2020 | | 2020 |