Chalkias, Ioannis
80  results:
Search for persons X
?
1

An Empirical Evaluation of Cyber Threat Intelligence Sharin..:

, In: Communications in Computer and Information Science; Digital Transformation, Cyber Security and Resilience,
 
?
4

On the Assessment of Completeness and Timeliness of Actiona..:

, In: Communications in Computer and Information Science; Multimedia Communications, Services and Security,
 
?
8

An Empirical Evaluation of Cyber Threat Intelligence Sharin..:

Chalkias, Ioannis ; Yucel, Cagatay ; Mallis, D...
https://eprints.bournemouth.ac.uk/39211/1/978-3-031-44440-1_3.pdf.  , 2023
 
?
9

Investigating IPTV Malware in the Wild:

Lockett, Adam ; Chalkias, Ioannis ; Yucel, Cagatay..
https://eprints.bournemouth.ac.uk/39035/1/futureinternet-15-00325.pdf.  , 2023
 
?
10

Privacy goals for the data lifecycle:

Henriksen-Bulmer, Jane ; Yucel, Cagatay ; Faily, Shamal.
https://rgu-repository.worktribe.com/output/1799586.  , 2022
 
?
11

Privacy Goals for the Data Lifecycle:

Henriksen-Bulmer, Jane ; Yucel, Cagatay ; Faily, Shamal.
https://eprints.bournemouth.ac.uk/37732/1/futureinternet-14-00315_published31-10-2022.pdf.  , 2022
 
?
12

Trust and quality computation for cyber threat intelligence..:

Mavzer, K.B ; Konieczna, E ; Alves, H...
https://eprints.bournemouth.ac.uk/36104/7/ACTI_TQM.pdf.  , 2021
 
?
 
1-15