Livinus Obiora Nweke

Orcid: 0000-0003-4888-6851

According to our database1, Livinus Obiora Nweke authored at least 15 papers between 2020 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Enhancing privacy protections in national identification systems: an examination of stakeholders' knowledge, attitudes, and practices of privacy by design.
Int. J. Inf. Sec., December, 2024

2023
Promoting Learners' Engagement to Maximize Learning in a Synchronous Online Workshop: A Case Study Analysis from Different Perspectives.
Proceedings of the Future Technologies Conference, 2023

2022
Using Formal Methods for Modelling Cyber-Physical Systems Security.
PhD thesis, 2022

Corrigendum to Threat Modelling of Cyber-Physical Systems Using an Applied π-Calculus.
Int. J. Crit. Infrastructure Prot., 2022

Investigating the effectiveness of a HyFlex cyber security training in a developing country: A case study.
Educ. Inf. Technol., 2022

System security assurance: A systematic literature review.
Comput. Sci. Rev., 2022

A comparison of primary stakeholders'views on the deployment of biometric technologies in border management: Case study of SMart mobILity at the European land borders.
CoRR, 2022

2021
Threat Modelling of Cyber-Physical Systems Using an Applied π-Calculus.
Int. J. Crit. Infrastructure Prot., 2021

The Ethics of Information Systems: The Present State of the Discussion and Avenues for Future Work.
Proceedings of the 29th European Conference on Information Systems, 2021

2020
Ethical Implications of Security Vulnerability Research for Critical Infrastructure Protection.
Proceedings of the Entwicklungen, 2020

Data-Driven and Artificial Intelligence (AI) Approach for Modelling and Analyzing Healthcare Security Practice: A Systematic Review.
Proceedings of the Intelligent Systems and Applications, 2020

Resilience Analysis of Software-Defined Networks Using Queueing Networks.
Proceedings of the International Conference on Computing, Networking and Communications, 2020

Adversary Model for Attacks Against IEC 61850 Real-Time Communication Protocols.
Proceedings of the 16th International Conference on the Design of Reliable Communication Networks, 2020

Legal Issues Related to Cyber Threat Information Sharing Among Private Entities for Critical Infrastructure Protection.
Proceedings of the 12th International Conference on Cyber Conflict, 2020

Modelling Adversarial Flow in Software-Defined Industrial Control Networks Using a Queueing Network Model.
Proceedings of the 8th IEEE Conference on Communications and Network Security, 2020


  Loading...