Artsiom Yautsiukhin

Orcid: 0000-0002-8493-1915

According to our database1, Artsiom Yautsiukhin authored at least 44 papers between 2006 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
A survey of human-computer interaction (HCI) & natural habits-based behavioural biometric modalities for user recognition schemes.
Pattern Recognit., July, 2023

2022
Product Incremental Security Risk Assessment Using DevSecOps Practices.
Proceedings of the Computer Security. ESORICS 2022 International Workshops, 2022

2021
Risk-Driven Behavioral Biometric-based One-Shot-cum-Continuous User Authentication Scheme.
J. Signal Process. Syst., 2021

Optimisation of cyber insurance coverage with selection of cost effective security controls.
Comput. Secur., 2021

2019
Towards the Insurance of Healthcare Systems.
Proceedings of the Computer Security - ESORICS 2019 International Workshops, 2019

Cyber Insurance and Time-to-Compromise: An Integrated Approach.
Proceedings of the International Conference on Cyber Situational Awareness, 2019

Cyber Insurance of Information Systems: Security and Privacy Cyber Insurance Contracts for ICT and Helathcare Organizations.
Proceedings of the 24th IEEE International Workshop on Computer Aided Modeling and Design of Communication Links and Networks, 2019

2018
Security policy monitoring of BPMN-based service compositions.
J. Softw. Evol. Process., 2018

Optimal Security Configuration for Cyber Insurance.
Proceedings of the ICT Systems Security and Privacy Protection, 2018

Cyber Insurance and Security Interdependence: Friends or Foes?
Proceedings of the International Conference On Cyber Situational Awareness, 2018

2017
Cyber-insurance survey.
Comput. Sci. Rev., 2017

Preventing the Drop in Security Investments for Non-competitive Cyber-Insurance Market.
Proceedings of the Risks and Security of Internet and Systems, 2017

2016
Security by Insurance for Services.
Proceedings of the 2016 IEEE International Conference on Software Quality, 2016

2015
Using Attack Graphs to Analyze Social Engineering Threats.
Int. J. Secur. Softw. Eng., 2015

Network security supported by arguments.
Proceedings of the 13th Annual Conference on Privacy, Security and Trust, 2015

Quantitative Analysis of Network Security with Abstract Argumentation.
Proceedings of the Data Privacy Management, and Security Assurance, 2015

Comprehensive Approach to Increase Cyber Security and Resilience.
Proceedings of the 10th International Conference on Availability, Reliability and Security, 2015

2014
Security Policy Monitoring of Composite Services.
Proceedings of the Secure and Trustworthy Service Composition - The Aniketos Approach, 2014

Determining the Probability of Smart Grid Attacks by Combining Attack Tree and Attack Graph Analysis.
Proceedings of the Smart Grid Security - Second International Workshop, 2014

Evaluation of Risk for Complex Systems Using Attack Surface.
Proceedings of the 25th IEEE International Symposium on Software Reliability Engineering Workshops, 2014

Evaluation of Adaptive Attacker Models.
Proceedings of the 2014 ESSoS Doctoral Symposium co-located with the International Symposium on Engineering Secure Software and Systems (ESSoS 2014), 2014

Analysis of Social Engineering Threats with Attack Graphs.
Proceedings of the Data Privacy Management, Autonomous Spontaneous Security, and Security Assurance, 2014

2013
Cost-Effective Enforcement of Access and Usage Control Policies Under Uncertainties.
IEEE Syst. J., 2013

Formal Analysis of Security Metrics with Defensive Actions.
Proceedings of the 2013 IEEE 10th International Conference on Ubiquitous Intelligence and Computing and 2013 IEEE 10th International Conference on Autonomic and Trusted Computing, 2013

Towards Attribute-Based Access Control Policy Engineering Using Risk.
Proceedings of the Risk Assessment and Risk-Driven Testing - First International Workshop, 2013

Towards Policy Engineering for Attribute-Based Access Control.
Proceedings of the Trusted Systems - 5th International Conference, 2013

Integration of Quantitative Methods for Risk Evaluation within Usage Control Policies.
Proceedings of the 22nd International Conference on Computer Communication and Networks, 2013

Multi-dimensional Secure Service Orchestration.
Proceedings of the Business Process Management Workshops, 2013

2012
Metric-Aware Secure Service Orchestration
Proceedings of the Proceedings Fifth Interaction and Concurrency Experience, 2012

Towards Modelling Adaptive Attacker's Behaviour.
Proceedings of the Foundations and Practice of Security - 5th International Symposium, 2012

2011
Formal Analysis of Security Metrics and Risk.
Proceedings of the Information Security Theory and Practice. Security and Privacy of Mobile Devices in Wireless Communication, 2011

A General Method for Assessment of Security in Complex Services.
Proceedings of the Towards a Service-Based Internet - 4th European Conference, 2011

Risk-Based Auto-delegation for Probabilistic Availability.
Proceedings of the Data Privacy Management and Autonomous Spontaneus Security, 2011

Cost-effective Enforcement of UCON<sub>A</sub> Policies.
Proceedings of the CRiSIS 2011, 2011

2010
Usage Control, Risk and Trust.
Proceedings of the Trust, 2010

Influence of Attribute Freshness on Decision Making in Usage Control.
Proceedings of the Security and Trust Management - 6th International Workshop, 2010

Risk-Based Usage Control for Service Oriented Architecture.
Proceedings of the 18th Euromicro Conference on Parallel, 2010

Formal approach to security metrics.: what does "more secure" mean for you?
Proceedings of the Software Architecture, 4th European Conference, 2010

2009
Logging key assurance indicators in business processes.
Proceedings of the 2009 ACM Symposium on Information, 2009

2008
Quantitative Assessment of Enterprise Security System.
Proceedings of the The Third International Conference on Availability, 2008

2007
The Meaning of Logs.
Proceedings of the Trust, 2007

An algorithm for the appraisal of assurance indicators for complex business processes.
Proceedings of the 3th ACM Workshop on Quality of Protection, 2007

Modelling Quality of Protection in Outsourced Business Processes.
Proceedings of the Third International Symposium on Information Assurance and Security, 2007

2006
Security and Trust in IT Business Outsourcing: a Manifesto.
Proceedings of the Second International Workshop on Security and Trust Management, 2006


  Loading...