Iryna Yevseyeva

Orcid: 0000-0002-1627-7624

Affiliations:
  • De Montfort University, Leicester, UK


According to our database1, Iryna Yevseyeva authored at least 55 papers between 2008 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Securing the remote office: reducing cyber risks to remote working through regular security awareness education campaigns.
Int. J. Inf. Sec., June, 2024

2023
Preface.
Nat. Comput., June, 2023

Integrated cybersecurity methodology and supporting tools for healthcare operational information systems.
Comput. Secur., June, 2023

Many-Criteria Optimisation and Decision Analysis Ontology and Knowledge Management.
Proceedings of the Many-Criteria Optimization and Decision Analysis: State-of-the-Art, 2023

Scenario-based incident response training: lessons learnt from conducting an experiential learning virtual incident response tabletop exercise.
Inf. Comput. Secur., 2023

2022
Systematic Literature Review: Anti-Phishing Defences and Their Application to Before-the-click Phishing Email Detection.
CoRR, 2022

CAESAR8: An agile enterprise architecture approach to managing information security risks.
Comput. Secur., 2022

2021
Designing Strong Privacy Metrics Suites Using Evolutionary Optimization.
ACM Trans. Priv. Secur., 2021

Preface to the special issue dedicated to the 14th international workshop on global optimization held in Leiden, The Netherlands, September 18-21, 2018.
J. Glob. Optim., 2021

2020
Game-based learning: A review of tabletop exercises for cybersecurity incident response training.
Secur. Priv., 2020

Bridging the Cyber Security Skills Gap: Using Tabletop Exercises to Solve the CSSG Crisis.
Proceedings of the Serious Games - Joint International Conference, 2020

DDOS Attacks Analysis Based on Machine Learning in Challenges of Global Changes.
Proceedings of the 2nd International Workshop on Modern Machine Learning Technologies and Data Science (MoMLeT+DS 2020). Volume I: Main Conference, 2020

Cyber Security Decision Making Informed by Cyber Threat Intelligence (CYDETI) : IEEE CNS 20 Poster.
Proceedings of the 8th IEEE Conference on Communications and Network Security, 2020

2019
A Practical Approach to Protect IoT Devices against Attacks and Compile Security Incident Datasets.
Sci. Program., 2019

A multiple classifier system identifies novel cannabinoid CB2 receptor ligands.
J. Cheminformatics, 2019

Application of portfolio optimization to drug discovery.
Inf. Sci., 2019

Published incidents and their proportions of human error.
Inf. Comput. Secur., 2019

Evaluating information security core human error causes (IS-CHEC) technique in public sector and comparison with the private sector.
Int. J. Medical Informatics, 2019

Improving the drug discovery process by using multiple classifier systems.
Expert Syst. Appl., 2019

Exploring the role of work identity and work locus of control in information security awareness.
Comput. Secur., 2019

Real-Time Information Security Incident Management: A Case Study Using the IS-CHEC Technique.
IEEE Access, 2019

Employee Perspective on Information Security Related Human Error in Healthcare: Proactive Use of IS-CHEC in Questionnaire Form.
IEEE Access, 2019

Users Intention Based on Twitter Features Using Text Analytics.
Proceedings of the Intelligent Data Engineering and Automated Learning - IDEAL 2019, 2019

Web Content Monitoring System Development.
Proceedings of the 3rd International Conference on Computational Linguistics and Intelligent Systems (COLINS-2019). Volume I: Main Conference, 2019

2018
Multiobjective sparse ensemble learning by means of evolutionary algorithms.
Decis. Support Syst., 2018

3D fast convex-hull-based evolutionary multiobjective optimization algorithm.
Appl. Soft Comput., 2018

Analysis of Published Public Sector Information Security Incidents and Breaches to establish the Proportions of Human Error.
Proceedings of the Twelfth International Symposium on Human Aspects of Information Security & Assurance, 2018

Web Resources Management Method Based on Intelligent Technologies.
Proceedings of the Advances in Intelligent Systems and Computing III, 2018

Content Formation Method in the Web Systems.
Proceedings of the 2nd International Conference on Computational Linguistics and Intelligent Systems, 2018

2017
Corrigendum to 'Multiobjective optimization of classifiers by means of 3D convex-hull-based evolutionary algorithms' [Information Sciences volumes 367-368 (2016) 80-104].
Inf. Sci., 2017

Corrigendum to "A spam filtering multi-objective optimization study covering parsimony maximization and three-way classification" [Applied Soft Computing Volume 48 (2016) 111-123].
Appl. Soft Comput., 2017

Indicator-Based Evolutionary Level Set Approximation: Mixed Mutation Strategy and Extended Analysis.
Proceedings of the Natural and Artificial Computation for Biomedicine and Neuroscience, 2017

Evolutionary Multi-objective Scheduling for Anti-Spam Filtering Throughput Optimization.
Proceedings of the Hybrid Artificial Intelligent Systems - 12th International Conference, 2017

Building and Using an Ontology of Preference-Based Multiobjective Evolutionary Algorithms.
Proceedings of the Evolutionary Multi-Criterion Optimization, 2017

A Comparison of Cybersecurity Risk Analysis Tools.
Proceedings of the CENTERIS 2017 - International Conference on ENTERprise Information Systems / ProjMAN 2017 - International Conference on Project MANagement / HCist 2017, 2017

2016
Modeling and analysis of influence power for information security decisions.
Perform. Evaluation, 2016

Multiobjective optimization of classifiers by means of 3D convex-hull-based evolutionary algorithms.
Inf. Sci., 2016

An Ontology of Preference-Based Multiobjective Evolutionary Algorithms.
CoRR, 2016

A spam filtering multi-objective optimization study covering parsimony maximization and three-way classification.
Appl. Soft Comput., 2016

Modularities maximization in multiplex network analysis using Many-Objective Optimization.
Proceedings of the 2016 IEEE Symposium Series on Computational Intelligence, 2016

2015
On using Markov Decision Processes to Model Integration Solutions for Disparate Resources in Software Ecosystems.
Proceedings of the ICEIS 2015, 2015

Quadcriteria Optimization of Binary Classifiers: Error Rates, Coverage, and Complexity.
Proceedings of the EVOLVE, 2015

Selecting Optimal Subset of Security Controls.
Proceedings of the Conference on ENTERprise Information Systems/International Conference on Project MANagement/Conference on Health and Social Care Information Systems and Technologies, 2015

An EAI Based Integration Solution for Science and Research Outcomes Information Management.
Proceedings of the Conference on ENTERprise Information Systems/International Conference on Project MANagement/Conference on Health and Social Care Information Systems and Technologies, 2015

A Bayesian Approach to Portfolio Selection in Multicriteria Group Decision Making.
Proceedings of the Conference on ENTERprise Information Systems/International Conference on Project MANagement/Conference on Health and Social Care Information Systems and Technologies, 2015

2014
Multiobjective Optimization of Classifiers by Means of 3-D Convex Hull Based Evolutionary Algorithm.
CoRR, 2014

A Formal Model for Soft Enforcement: Influencing the Decision-Maker.
Proceedings of the Security and Trust Management - 10th International Workshop, 2014

A Portfolio Optimization Approach to Selection in Multiobjective Evolutionary Algorithms.
Proceedings of the Parallel Problem Solving from Nature - PPSN XIII, 2014

Nudging for Quantitative Access Control Systems.
Proceedings of the Human Aspects of Information Security, Privacy, and Trust, 2014

A Decision Making Model of Influencing Behavior in Information Security.
Proceedings of the Computer Performance Engineering - 11th European Workshop, 2014

2013
Multicriteria Models for Learning Ordinal Data: A Literature Review.
Proceedings of the Artificial Intelligence, Evolutionary Computing and Metaheuristics, 2013

Optimization of Anti-Spam Systems with Multiobjective Evolutionary Algorithms.
Inf. Resour. Manag. J., 2013

Optimising anti-spam filters with evolutionary algorithms.
Expert Syst. Appl., 2013

2011
Survey on Anti-spam Single and Multi-objective Optimization.
Proceedings of the ENTERprise Information Systems - International Conference, 2011

2008
Verbal ordinal classification with multicriteria decision aiding.
Eur. J. Oper. Res., 2008


  Loading...