Artsiom Yautsiukhin
Orcid: 0000-0002-8493-1915
According to our database1,
Artsiom Yautsiukhin
authored at least 44 papers
between 2006 and 2023.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2023
A survey of human-computer interaction (HCI) & natural habits-based behavioural biometric modalities for user recognition schemes.
Pattern Recognit., July, 2023
2022
Proceedings of the Computer Security. ESORICS 2022 International Workshops, 2022
2021
Risk-Driven Behavioral Biometric-based One-Shot-cum-Continuous User Authentication Scheme.
J. Signal Process. Syst., 2021
Optimisation of cyber insurance coverage with selection of cost effective security controls.
Comput. Secur., 2021
2019
Proceedings of the Computer Security - ESORICS 2019 International Workshops, 2019
Proceedings of the International Conference on Cyber Situational Awareness, 2019
Cyber Insurance of Information Systems: Security and Privacy Cyber Insurance Contracts for ICT and Helathcare Organizations.
Proceedings of the 24th IEEE International Workshop on Computer Aided Modeling and Design of Communication Links and Networks, 2019
2018
J. Softw. Evol. Process., 2018
Proceedings of the ICT Systems Security and Privacy Protection, 2018
Proceedings of the International Conference On Cyber Situational Awareness, 2018
2017
Preventing the Drop in Security Investments for Non-competitive Cyber-Insurance Market.
Proceedings of the Risks and Security of Internet and Systems, 2017
2016
Proceedings of the 2016 IEEE International Conference on Software Quality, 2016
2015
Int. J. Secur. Softw. Eng., 2015
Proceedings of the 13th Annual Conference on Privacy, Security and Trust, 2015
Proceedings of the Data Privacy Management, and Security Assurance, 2015
Proceedings of the 10th International Conference on Availability, Reliability and Security, 2015
2014
Proceedings of the Secure and Trustworthy Service Composition - The Aniketos Approach, 2014
Determining the Probability of Smart Grid Attacks by Combining Attack Tree and Attack Graph Analysis.
Proceedings of the Smart Grid Security - Second International Workshop, 2014
Proceedings of the 25th IEEE International Symposium on Software Reliability Engineering Workshops, 2014
Proceedings of the 2014 ESSoS Doctoral Symposium co-located with the International Symposium on Engineering Secure Software and Systems (ESSoS 2014), 2014
Proceedings of the Data Privacy Management, Autonomous Spontaneous Security, and Security Assurance, 2014
2013
IEEE Syst. J., 2013
Proceedings of the 2013 IEEE 10th International Conference on Ubiquitous Intelligence and Computing and 2013 IEEE 10th International Conference on Autonomic and Trusted Computing, 2013
Proceedings of the Risk Assessment and Risk-Driven Testing - First International Workshop, 2013
Proceedings of the Trusted Systems - 5th International Conference, 2013
Integration of Quantitative Methods for Risk Evaluation within Usage Control Policies.
Proceedings of the 22nd International Conference on Computer Communication and Networks, 2013
Proceedings of the Business Process Management Workshops, 2013
2012
Proceedings of the Proceedings Fifth Interaction and Concurrency Experience, 2012
Proceedings of the Foundations and Practice of Security - 5th International Symposium, 2012
2011
Proceedings of the Information Security Theory and Practice. Security and Privacy of Mobile Devices in Wireless Communication, 2011
Proceedings of the Towards a Service-Based Internet - 4th European Conference, 2011
Proceedings of the Data Privacy Management and Autonomous Spontaneus Security, 2011
Proceedings of the CRiSIS 2011, 2011
2010
Proceedings of the Security and Trust Management - 6th International Workshop, 2010
Proceedings of the 18th Euromicro Conference on Parallel, 2010
Proceedings of the Software Architecture, 4th European Conference, 2010
2009
Proceedings of the 2009 ACM Symposium on Information, 2009
2008
Proceedings of the The Third International Conference on Availability, 2008
2007
An algorithm for the appraisal of assurance indicators for complex business processes.
Proceedings of the 3th ACM Workshop on Quality of Protection, 2007
Proceedings of the Third International Symposium on Information Assurance and Security, 2007
2006
Proceedings of the Second International Workshop on Security and Trust Management, 2006