Follow
Livinus Obiora Nweke
Title
Cited by
Cited by
Year
Using the CIA and AAA Models to Explain Cybersecurity Activities
LO Nweke
502017
Applying Software-Defined Networking to Support Telemedicine Health Consultation During and Post Covid-19 Era
BA Jnr., LO Nweke, MA Al-Sharafi
Health and Technology, 2020
322020
System security assurance: A systematic literature review
A Shukla, B Katt, LO Nweke, PK Yeng, GK Weldehawaryat
Computer Science Review 45, 100496, 2022
302022
A Review of Asset-Centric Threat Modelling Approaches
LO Nweke, SD Wolthusen
International Journal of Advanced Computer Science and Applications 11 (2), 1-6, 2020
302020
Legal Issues Related to Cyber Threat Information Sharing Among Private Entities for Critical Infrastructure Protection
LO Nweke, S Wolthusen
12th International Conference on Cyber Conflict, CyCon 2020; Virtual, Online …, 2020
262020
A comparison of primary stakeholders views on the deployment of biometrics technology in border management: Case study of smart mobility at the European land borders
M Abomhara, SY Yayilgan, LO Nweke, Z Székely
Technology in Society 64, 2021
182021
Data-Driven and Artificial Intelligence (AI) Approach for Modelling and Analyzing Healthcare Security Practice: A Systematic Review
P Yeng, LO Nweke, AZ Woldaregay, B Yang, EA Snekkenes
Intelligent Systems Conference (IntelliSys), Amsterdam, Netherlands, 2020
172020
Investigating the effectiveness of a HyFlex cyber security training in a developing country: A case study
LO Nweke, AJ Bokolo, G Mba, E Nwigwe
Education and Information Technologies 27 (7), 10107-10133, 2022
162022
Vulnerability Discovery Modelling With Vulnerability Severity
A Shukla, B Katt, LO Nweke
Institute of Electrical and Electronics Engineers (IEEE), 2019
132019
The Ethics of Information Systems: The Present State of the Discussion and Avenues for Future Work
A Bock, J Gulden, S Espana, K Jahn, LO Nweke, A Richter
29th European Conference on Information Systems (ECIS 2021), Marrakech, Morocco, 2021
122021
Understanding Attribute-Based Access Control for Modelling and Analysing Healthcare Professionals' Security Practices
LO Nweke, P Yeng, S Wolthusen, B Yang
International Journal of Advanced Computer Science and Applications 11 (2 …, 2020
102020
A Survey of Specification-based Intrusion Detection Techniques for Cyber-Physical Systems
LO Nweke
International Journal of Advanced Computer Science and Applications 12 (5 …, 2021
92021
Threat Modelling of Cyber-Physical Systems Using an Applied Pi-Calculus
LO Nweke, GK Weldehawaryat, S Wolthusen
International Journal of Critical Infrastructure Protection, 2021
92021
Artificial intelligence–based framework for analyzing health care staff security practice: Mapping review and simulation study
PK Yeng, LO Nweke, B Yang, M Ali Fauzi, EA Snekkenes
JMIR medical informatics 9 (12), e19250, 2021
82021
Modelling Adversarial Flow in Software-Defined Industrial Control Networks Using a Queueing Network Model
LO Nweke, S Wolthusen
IEEE Conference on Communications and Network Security, Avignon, France, 2020
72020
Adversary Model for Attacks Against IEC 61850 Real-Time Communication Protocols
LO Nweke, GK Weldehawaryat, S Wolthusen
International Conference on the Design of Reliable Communication Networks …, 2020
62020
Ethical Implications of Security Vulnerability Research for Critical Infrastructure Protection
LO Nweke, S Wolthusen
WI2020 Community Tracks, 331-340, 2020
42020
Resilience Analysis of Software-Defined Networks Using Queueing Networks
LO Nweke, S Wolthusen
Conference: International Conference on Computing, Networking and …, 2020
42020
A linddun-based privacy threat modelling for national identification systems
LO Nweke, M Abomhara, SY Yayilgan, D Comparin, O Heurtier, C Bunney
2022 IEEE Nigeria 4th International Conference on Disruptive Technologies …, 2022
32022
Corrigendum to Threat Modelling of Cyber-Physical Systems Using an Applied π-Calculus
LO Nweke, GK Weldehawaryat, SD Wolthusen
International Journal of Critical Infrastructure Protection 36, 100506, 2022
22022
The system can't perform the operation now. Try again later.
Articles 1–20