default search action
Iryna Yevseyeva
Person information
- affiliation: De Montfort University, Leicester, UK
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j27]Giddeon Njamngang Angafor, Iryna Yevseyeva, Leandros Maglaras:
Securing the remote office: reducing cyber risks to remote working through regular security awareness education campaigns. Int. J. Inf. Sec. 23(3): 1679-1693 (2024) - 2023
- [j26]Bruno Coutinho, João Ferreira, Iryna Yevseyeva, Vitor Basto-Fernandes:
Integrated cybersecurity methodology and supporting tools for healthcare operational information systems. Comput. Secur. 129: 103189 (2023) - [j25]Giddeon Njamngang Angafor, Iryna Yevseyeva, Leandros Maglaras:
Scenario-based incident response training: lessons learnt from conducting an experiential learning virtual incident response tabletop exercise. Inf. Comput. Secur. 31(4): 404-426 (2023) - [j24]Michael Emmerich, André H. Deutz, Iryna Yevseyeva:
Preface. Nat. Comput. 22(2): 225-226 (2023) - [p2]Vitor Basto-Fernandes, Diana Salvador, Iryna Yevseyeva, Michael Emmerich:
Many-Criteria Optimisation and Decision Analysis Ontology and Knowledge Management. Many-Criteria Optimization and Decision Analysis 2023: 337-354 - [e2]Michael Emmerich, André H. Deutz, Hao Wang, Anna V. Kononova, Boris Naujoks, Ke Li, Kaisa Miettinen, Iryna Yevseyeva:
Evolutionary Multi-Criterion Optimization - 12th International Conference, EMO 2023, Leiden, The Netherlands, March 20-24, 2023, Proceedings. Lecture Notes in Computer Science 13970, Springer 2023, ISBN 978-3-031-27249-3 [contents] - 2022
- [j23]Paul Loft, Ying He, Iryna Yevseyeva, Isabel Wagner:
CAESAR8: An agile enterprise architecture approach to managing information security risks. Comput. Secur. 122: 102877 (2022) - [i3]Trevor Wood, Vitor Basto-Fernandes, Eerke Boiten, Iryna Yevseyeva:
Systematic Literature Review: Anti-Phishing Defences and Their Application to Before-the-click Phishing Email Detection. CoRR abs/2204.13054 (2022) - 2021
- [j22]André H. Deutz, Michael Emmerich, Yaroslav D. Sergeyev, Iryna Yevseyeva:
Preface to the special issue dedicated to the 14th international workshop on global optimization held in Leiden, The Netherlands, September 18-21, 2018. J. Glob. Optim. 79(2): 279-280 (2021) - [j21]Isabel Wagner, Iryna Yevseyeva:
Designing Strong Privacy Metrics Suites Using Evolutionary Optimization. ACM Trans. Priv. Secur. 24(2): 12:1-12:35 (2021) - 2020
- [j20]Giddeon Njamngang Angafor, Iryna Yevseyeva, Ying He:
Game-based learning: A review of tabletop exercises for cybersecurity incident response training. Secur. Priv. 3(6) (2020) - [c23]Aliyu Aliyu, Ying He, Iryna Yevseyeva, Cunjin Luo:
Cyber Security Decision Making Informed by Cyber Threat Intelligence (CYDETI) : IEEE CNS 20 Poster. CNS 2020: 1-2 - [c22]Roman Lynnyk, Victoria Vysotska, Yurii Matseliukh, Yevhen Burov, Lyubomyr I. Demkiv, Andrij Zaverbnyj, Anatoliy Sachenko, Inna Shylinska, Iryna Yevseyeva, Oksana Bihun:
DDOS Attacks Analysis Based on Machine Learning in Challenges of Global Changes. MoMLeT+DS 2020: 159-171 - [c21]Giddeon Njamngang Angafor, Iryna Yevseyeva, Ying He:
Bridging the Cyber Security Skills Gap: Using Tabletop Exercises to Solve the CSSG Crisis. JCSG 2020: 117-131
2010 – 2019
- 2019
- [j19]Mark Glenn Evans, Ying He, Cunjin Luo, Iryna Yevseyeva, Helge Janicke, Leandros A. Maglaras:
Employee Perspective on Information Security Related Human Error in Healthcare: Proactive Use of IS-CHEC in Questionnaire Form. IEEE Access 7: 102087-102101 (2019) - [j18]Mark Glenn Evans, Ying He, Cunjin Luo, Iryna Yevseyeva, Helge Janicke, Efpraxia D. Zamani, Leandros A. Maglaras:
Real-Time Information Security Incident Management: A Case Study Using the IS-CHEC Technique. IEEE Access 7: 142147-142175 (2019) - [j17]Lee Hadlington, Masa Popovac, Helge Janicke, Iryna Yevseyeva, Kevin I. Jones:
Exploring the role of work identity and work locus of control in information security awareness. Comput. Secur. 81: 41-48 (2019) - [j16]David Ruano-Ordás, Iryna Yevseyeva, Vitor Basto-Fernandes, José Ramón Méndez, Michael T. M. Emmerich:
Improving the drug discovery process by using multiple classifier systems. Expert Syst. Appl. 121: 292-303 (2019) - [j15]Mark Glenn Evans, Ying He, Leandros A. Maglaras, Iryna Yevseyeva, Helge Janicke:
Evaluating information security core human error causes (IS-CHEC) technique in public sector and comparison with the private sector. Int. J. Medical Informatics 127: 109-119 (2019) - [j14]Mark Glenn Evans, Ying He, Iryna Yevseyeva, Helge Janicke:
Published incidents and their proportions of human error. Inf. Comput. Secur. 27(3): 343-357 (2019) - [j13]Iryna Yevseyeva, Eelke B. Lenselink, Alice de Vries, Adriaan P. IJzerman, André H. Deutz, Michael T. M. Emmerich:
Application of portfolio optimization to drug discovery. Inf. Sci. 475: 29-43 (2019) - [j12]David Ruano-Ordás, Lindsey Burggraaff, Rongfang Liu, Cas van der Horst, Laura H. Heitman, Michael T. M. Emmerich, José Ramón Méndez, Iryna Yevseyeva, Gerard J. P. van Westen:
A multiple classifier system identifies novel cannabinoid CB2 receptor ligands. J. Cheminformatics 11(1): 66:1-66:14 (2019) - [j11]Bruno Cruz, Silvana Gómez Meire, David Ruano-Ordás, Helge Janicke, Iryna Yevseyeva, José Ramón Méndez:
A Practical Approach to Protect IoT Devices against Attacks and Compile Security Incident Datasets. Sci. Program. 2019: 9067512:1-9067512:11 (2019) - [c20]Lyubomyr Chyrun, Aleksandr Gozhyj, Iryna Yevseyeva, Dmytro Dosyn, Valentin Tyhonov, Maryana Zakharchuk:
Web Content Monitoring System Development. COLINS 2019: 126-142 - [c19]Qadri Mishael, Aladdin Ayesh, Iryna Yevseyeva:
Users Intention Based on Twitter Features Using Text Analytics. IDEAL (1) 2019: 121-128 - [e1]Michael Emmerich, Vasyl Lytvyn, Iryna Yevseyeva, Vitor Basto-Fernandes, Dmytro Dosyn, Victoria Vysotska:
Modern Machine Learning Technologies, Workshop Proceedings of the 8th International Conference on "Mathematics. Information Technologies. Education", MoMLeT&DS-2019, Shatsk, Ukraine, June 2-4, 2019. CEUR Workshop Proceedings 2386, CEUR-WS.org 2019 [contents] - 2018
- [j10]Jiaqi Zhao, Licheng Jiao, Fang Liu, Vitor Basto-Fernandes, Iryna Yevseyeva, Shixiong Xia, Michael T. M. Emmerich:
3D fast convex-hull-based evolutionary multiobjective optimization algorithm. Appl. Soft Comput. 67: 322-336 (2018) - [j9]Jiaqi Zhao, Licheng Jiao, Shixiong Xia, Vitor Basto-Fernandes, Iryna Yevseyeva, Yong Zhou, Michael T. M. Emmerich:
Multiobjective sparse ensemble learning by means of evolutionary algorithms. Decis. Support Syst. 111: 86-100 (2018) - [c18]Vasyl Lytvyn, Dmytro Dosyn, Michael Emmerich, Iryna Yevseyeva:
Content Formation Method in the Web Systems. COLINS 2018: 42-61 - [c17]Aleksandr Gozhyj, Victoria Vysotska, Iryna Yevseyeva, Irina Kalinina, Victor Gozhyj:
Web Resources Management Method Based on Intelligent Technologies. CSIT 2018: 206-221 - [c16]Mark Glenn Evans, Ying He, Iryna Yevseyeva, Helge Janicke:
Analysis of Published Public Sector Information Security Incidents and Breaches to establish the Proportions of Human Error. HAISA 2018: 191-202 - 2017
- [j8]Vitor Basto-Fernandes, Iryna Yevseyeva, José Ramón Méndez, Jiaqi Zhao, Florentino Fdez-Riverola, Michael T. M. Emmerich:
Corrigendum to "A spam filtering multi-objective optimization study covering parsimony maximization and three-way classification" [Applied Soft Computing Volume 48 (2016) 111-123]. Appl. Soft Comput. 55: 565 (2017) - [j7]Jiaqi Zhao, Vitor Basto-Fernandes, Licheng Jiao, Iryna Yevseyeva, Asep Maulana, Rui Li, Thomas Bäck, Ke Tang, Michael T. M. Emmerich:
Corrigendum to 'Multiobjective optimization of classifiers by means of 3D convex-hull-based evolutionary algorithms' [Information Sciences volumes 367-368 (2016) 80-104]. Inf. Sci. 403: 55 (2017) - [c15]Gabriela R. Roldán-Molina, Mario Almache-Cueva, Carlos Silva-Rabadão, Iryna Yevseyeva, Vitor Basto-Fernandes:
A Comparison of Cybersecurity Risk Analysis Tools. CENTERIS/ProjMAN/HCist 2017: 568-575 - [c14]Longmei Li, Iryna Yevseyeva, Vitor Basto-Fernandes, Heike Trautmann, Ning Jing, Michael Emmerich:
Building and Using an Ontology of Preference-Based Multiobjective Evolutionary Algorithms. EMO 2017: 406-421 - [c13]David Ruano-Ordás, Vitor Basto-Fernandes, Iryna Yevseyeva, José Ramón Méndez:
Evolutionary Multi-objective Scheduling for Anti-Spam Filtering Throughput Optimization. HAIS 2017: 137-148 - [c12]Lai-Yee Liu, Vitor Basto-Fernandes, Iryna Yevseyeva, Joost N. Kok, Michael Emmerich:
Indicator-Based Evolutionary Level Set Approximation: Mixed Mutation Strategy and Extended Analysis. IWINAC (1) 2017: 146-159 - 2016
- [j6]Vitor Basto-Fernandes, Iryna Yevseyeva, José Ramón Méndez, Jiaqi Zhao, Florentino Fdez-Riverola, Michael T. M. Emmerich:
A spam filtering multi-objective optimization study covering parsimony maximization and three-way classification. Appl. Soft Comput. 48: 111-123 (2016) - [j5]Jiaqi Zhao, Vitor Basto-Fernandes, Licheng Jiao, Iryna Yevseyeva, Asep Maulana, Rui Li, Thomas Bäck, Ke Tang, Michael T. M. Emmerich:
Multiobjective optimization of classifiers by means of 3D convex-hull-based evolutionary algorithms. Inf. Sci. 367-368: 80-104 (2016) - [j4]Iryna Yevseyeva, Charles Morisset, Aad P. A. van Moorsel:
Modeling and analysis of influence power for information security decisions. Perform. Evaluation 98: 36-51 (2016) - [c11]Asep Maulana, Valerio Gemmetto, Diego Garlaschelli, Iryna Yevseyeva, Michael Emmerich:
Modularities maximization in multiplex network analysis using Many-Objective Optimization. SSCI 2016: 1-8 - [i2]Longmei Li, Iryna Yevseyeva, Vitor Basto-Fernandes, Heike Trautmann, Ning Jing, Michael T. M. Emmerich:
An Ontology of Preference-Based Multiobjective Evolutionary Algorithms. CoRR abs/1609.08082 (2016) - 2015
- [c10]Fernando Rosa-Sequeira, Rafael Z. Frantz, Iryna Yevseyeva, Michael T. M. Emmerich, Vitor Basto-Fernandes:
An EAI Based Integration Solution for Science and Research Outcomes Information Management. CENTERIS/ProjMAN/HCist 2015: 894-901 - [c9]Michael T. M. Emmerich, André H. Deutz, Iryna Yevseyeva:
A Bayesian Approach to Portfolio Selection in Multicriteria Group Decision Making. CENTERIS/ProjMAN/HCist 2015: 993-1000 - [c8]Iryna Yevseyeva, Vitor Basto-Fernandes, Michael Emmerich, Aad van Moorsel:
Selecting Optimal Subset of Security Controls. CENTERIS/ProjMAN/HCist 2015: 1035-1042 - [c7]Vitor Basto-Fernandes, Iryna Yevseyeva, David Ruano-Ordás, Jiaqi Zhao, Florentino Fdez-Riverola, José Ramón Méndez, Michael T. M. Emmerich:
Quadcriteria Optimization of Binary Classifiers: Error Rates, Coverage, and Complexity. EVOLVE 2015: 37-49 - [c6]Rafael Z. Frantz, Sandro Sawicki, Fabricia Roos-Frantz, Iryna Yevseyeva, Michael T. M. Emmerich:
On using Markov Decision Processes to Model Integration Solutions for Disparate Resources in Software Ecosystems. ICEIS (2) 2015: 260-267 - 2014
- [c5]Iryna Yevseyeva, Charles Morisset, Thomas Groß, Aad P. A. van Moorsel:
A Decision Making Model of Influencing Behavior in Information Security. EPEW 2014: 194-208 - [c4]Charles Morisset, Thomas Groß, Aad P. A. van Moorsel, Iryna Yevseyeva:
Nudging for Quantitative Access Control Systems. HCI (24) 2014: 340-351 - [c3]Iryna Yevseyeva, Andreia P. Guerreiro, Michael T. M. Emmerich, Carlos M. Fonseca:
A Portfolio Optimization Approach to Selection in Multiobjective Evolutionary Algorithms. PPSN 2014: 672-681 - [c2]Charles Morisset, Iryna Yevseyeva, Thomas Groß, Aad P. A. van Moorsel:
A Formal Model for Soft Enforcement: Influencing the Decision-Maker. STM 2014: 113-128 - [i1]Jiaqi Zhao, Vitor Basto-Fernandes, Licheng Jiao, Iryna Yevseyeva, Asep Maulana, Rui Li, Thomas Bäck, Michael T. M. Emmerich:
Multiobjective Optimization of Classifiers by Means of 3-D Convex Hull Based Evolutionary Algorithm. CoRR abs/1412.5710 (2014) - 2013
- [j3]Iryna Yevseyeva, Vitor Basto-Fernandes, David Ruano-Ordás, José Ramón Méndez:
Optimising anti-spam filters with evolutionary algorithms. Expert Syst. Appl. 40(10): 4010-4021 (2013) - [j2]Vitor Basto-Fernandes, Iryna Yevseyeva, José Ramón Méndez:
Optimization of Anti-Spam Systems with Multiobjective Evolutionary Algorithms. Inf. Resour. Manag. J. 26(1): 54-67 (2013) - [p1]Ricardo Gamelas Sousa, Iryna Yevseyeva, Joaquim F. Pinto da Costa, Jaime S. Cardoso:
Multicriteria Models for Learning Ordinal Data: A Literature Review. Artificial Intelligence, Evolutionary Computing and Metaheuristics 2013: 109-138 - 2011
- [c1]Iryna Yevseyeva, Vitor Basto-Fernandes, José Ramón Méndez:
Survey on Anti-spam Single and Multi-objective Optimization. CENTERIS (2) 2011: 120-129
2000 – 2009
- 2008
- [j1]Iryna Yevseyeva, Kaisa Miettinen, Pekka Räsänen:
Verbal ordinal classification with multicriteria decision aiding. Eur. J. Oper. Res. 185(3): 964-983 (2008)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-05 21:16 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint