Using the CIA and AAA Models to Explain Cybersecurity Activities LO Nweke | 59 | 2017 |
System security assurance: A systematic literature review A Shukla, B Katt, LO Nweke, PK Yeng, GK Weldehawaryat Computer Science Review 45, 100496, 2022 | 40 | 2022 |
A Review of Asset-Centric Threat Modelling Approaches LO Nweke, SD Wolthusen International Journal of Advanced Computer Science and Applications 11 (2), 1-6, 2020 | 38 | 2020 |
Applying Software-Defined Networking to Support Telemedicine Health Consultation During and Post Covid-19 Era BA Jnr., LO Nweke, MA Al-Sharafi Health and Technology, 2020 | 35 | 2020 |
Legal Issues Related to Cyber Threat Information Sharing Among Private Entities for Critical Infrastructure Protection LO Nweke, S Wolthusen 12th International Conference on Cyber Conflict, CyCon 2020; Virtual, Online …, 2020 | 32 | 2020 |
Investigating the effectiveness of a HyFlex cyber security training in a developing country: A case study LO Nweke, AJ Bokolo, G Mba, E Nwigwe Education and Information Technologies 27 (7), 10107-10133, 2022 | 22 | 2022 |
Data-Driven and Artificial Intelligence (AI) Approach for Modelling and Analyzing Healthcare Security Practice: A Systematic Review P Yeng, LO Nweke, AZ Woldaregay, B Yang, EA Snekkenes Intelligent Systems Conference (IntelliSys), Amsterdam, Netherlands, 2020 | 22 | 2020 |
A comparison of primary stakeholders views on the deployment of biometrics technology in border management: Case study of smart mobility at the European land borders M Abomhara, SY Yayilgan, LO Nweke, Z Székely Technology in Society 64, 2021 | 21 | 2021 |
Understanding Attribute-Based Access Control for Modelling and Analysing Healthcare Professionals' Security Practices LO Nweke, P Yeng, S Wolthusen, B Yang International Journal of Advanced Computer Science and Applications 11 (2 …, 2020 | 14 | 2020 |
The Ethics of Information Systems: The Present State of the Discussion and Avenues for Future Work A Bock, J Gulden, S Espana, K Jahn, LO Nweke, A Richter 29th European Conference on Information Systems (ECIS 2021), Marrakech, Morocco, 2021 | 13 | 2021 |
A Survey of Specification-based Intrusion Detection Techniques for Cyber-Physical Systems LO Nweke International Journal of Advanced Computer Science and Applications 12 (5 …, 2021 | 13 | 2021 |
Vulnerability Discovery Modelling With Vulnerability Severity A Shukla, B Katt, LO Nweke Institute of Electrical and Electronics Engineers (IEEE), 2019 | 13 | 2019 |
Artificial intelligence–based framework for analyzing health care staff security practice: Mapping review and simulation study PK Yeng, LO Nweke, B Yang, M Ali Fauzi, EA Snekkenes JMIR medical informatics 9 (12), e19250, 2021 | 11 | 2021 |
Threat Modelling of Cyber-Physical Systems Using an Applied Pi-Calculus LO Nweke, GK Weldehawaryat, S Wolthusen International Journal of Critical Infrastructure Protection, 2021 | 11 | 2021 |
A LINDDUN-Based Privacy Threat Modelling for National Identification Systems LO Nweke, M Abomhara, SY Yayilgan, D Comparin, O Heurtier, C Bunney 2022 IEEE Nigeria 4th International Conference on Disruptive Technologies …, 2022 | 7 | 2022 |
Modelling Adversarial Flow in Software-Defined Industrial Control Networks Using a Queueing Network Model LO Nweke, S Wolthusen IEEE Conference on Communications and Network Security, Avignon, France, 2020 | 7 | 2020 |
Adversary Model for Attacks Against IEC 61850 Real-Time Communication Protocols LO Nweke, GK Weldehawaryat, S Wolthusen International Conference on the Design of Reliable Communication Networks …, 2020 | 6 | 2020 |
Ethical Implications of Security Vulnerability Research for Critical Infrastructure Protection LO Nweke, S Wolthusen WI2020 Community Tracks, 331-340, 2020 | 4 | 2020 |
Resilience Analysis of Software-Defined Networks Using Queueing Networks LO Nweke, S Wolthusen Conference: International Conference on Computing, Networking and …, 2020 | 4 | 2020 |
National Identification Systems As Enablers of Online Identity LO Nweke Online Identity - An Essential Guide, 2023 | 2 | 2023 |