1. Behavioral and Game-Theoretic Security Investments in Interdependent Systems Modeled by Attack Graphs
2. Mohamed G Ahmed , Sakshyam Panda , Christos Xenakis , and Emmanouil Panaousis . 2022 . MITRE ATT&CK-driven Cyber Risk Assessment. In The 17th International Conference on Availability, Reliability and Security. Mohamed G Ahmed, Sakshyam Panda, Christos Xenakis, and Emmanouil Panaousis. 2022. MITRE ATT&CK-driven Cyber Risk Assessment. In The 17th International Conference on Availability, Reliability and Security.
3. Nadia Boumkheld , Sakshyam Panda , Stefan Rass , and Emmanouil Panaousis . 2019. Honeypot Type Selection Games for Smart Grid Networks . In Decision and Game Theory for Security, Tansu Alpcan, Yevgeniy Vorobeychik, John S . Baras, and György Dán (Eds.). Springer International Publishing , Cham , 85–96. Nadia Boumkheld, Sakshyam Panda, Stefan Rass, and Emmanouil Panaousis. 2019. Honeypot Type Selection Games for Smart Grid Networks. In Decision and Game Theory for Security, Tansu Alpcan, Yevgeniy Vorobeychik, John S. Baras, and György Dán (Eds.). Springer International Publishing, Cham, 85–96.
4. A Comparison of Natural Language Processing and Machine Learning Methods for Phishing Email Detection
5. EKnad: Exploit Kits’ network activity detection