Our publications
2022
-
Blockchain Patterns in Critical Infrastructures: Limitations and Recommendations
The 17th International Conference on Software and Data Technologies (ICSOFT), year: 2022
-
Business Process Model and Notation for Forensic-Ready Software Systems
Proceedings of the 17th International Conference on Evaluation of Novel Approaches to Software Engineering, year: 2022
-
Collaborative Paradigm of Teaching Penetration Testing using Real-World University Applications
Australasian Computing Education Conference (ACE '22), year: 2022
-
Complex Networks in Cybersecurity: Applications and Challenges
Year: 2022, type:
-
Concept of Relational Similarity Search
Similarity Search and Applications: 15th International Conference, SISAP 2022, Bologna, Italy, October 5 - October 7, 2020, Proceedings, year: 2022
-
CRUSOE: A Toolset for Cyber Situational Awareness and Decision Support in Incident Handling
Computers & Security, year: 2022, volume: 115, edition: April, DOI
-
Cybersecurity Analysis via Process Mining: A Systematic Literature Review
Advanced Data Mining and Applications, year: 2022
-
Cybersecurity certification and compliance in financial services
Data Governance in AI, FinTech and LegalTech, year: 2022, number of pages: 25 s.
-
Data-dependent Metric Filtering
Information systems, year: 2022, volume: 108, edition: 12.5.2022, DOI
-
Data-driven insight into the puzzle-based cybersecurity training
Computers & Graphics, year: 2022, volume: 102, edition: February 2022, DOI