


Остановите войну!
for scientists:


default search action
Iryna Yevseyeva
Person information

- affiliation: De Montfort University, Leicester, UK
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2022
- [j23]Paul Loft, Ying He
, Iryna Yevseyeva
, Isabel Wagner
:
CAESAR8: An agile enterprise architecture approach to managing information security risks. Comput. Secur. 122: 102877 (2022) - [i3]Trevor Wood, Vítor Basto Fernandes, Eerke Boiten, Iryna Yevseyeva:
Systematic Literature Review: Anti-Phishing Defences and Their Application to Before-the-click Phishing Email Detection. CoRR abs/2204.13054 (2022) - 2021
- [j22]André H. Deutz, Michael Emmerich, Yaroslav D. Sergeyev, Iryna Yevseyeva:
Preface to the special issue dedicated to the 14th international workshop on global optimization held in Leiden, The Netherlands, September 18-21, 2018. J. Glob. Optim. 79(2): 279-280 (2021) - [j21]Isabel Wagner
, Iryna Yevseyeva:
Designing Strong Privacy Metrics Suites Using Evolutionary Optimization. ACM Trans. Priv. Secur. 24(2): 12:1-12:35 (2021) - 2020
- [j20]Giddeon N. Angafor
, Iryna Yevseyeva
, Ying He
:
Game-based learning: A review of tabletop exercises for cybersecurity incident response training. Secur. Priv. 3(6) (2020) - [c23]Aliyu Aliyu, Ying He, Iryna Yevseyeva, Cunjin Luo:
Cyber Security Decision Making Informed by Cyber Threat Intelligence (CYDETI) : IEEE CNS 20 Poster. CNS 2020: 1-2 - [c22]Roman Lynnyk, Victoria Vysotska, Yurii Matseliukh, Yevhen Burov, Lyubomyr Demkiv, Andrij Zaverbnyj, Anatoliy Sachenko, Inna Shylinska, Iryna Yevseyeva, Oksana Bihun:
DDOS Attacks Analysis Based on Machine Learning in Challenges of Global Changes. MoMLeT+DS 2020: 159-171 - [c21]Giddeon N. Angafor
, Iryna Yevseyeva
, Ying He
:
Bridging the Cyber Security Skills Gap: Using Tabletop Exercises to Solve the CSSG Crisis. JCSG 2020: 117-131
2010 – 2019
- 2019
- [j19]Mark Glenn Evans, Ying He
, Cunjin Luo, Iryna Yevseyeva, Helge Janicke
, Leandros A. Maglaras
:
Employee Perspective on Information Security Related Human Error in Healthcare: Proactive Use of IS-CHEC in Questionnaire Form. IEEE Access 7: 102087-102101 (2019) - [j18]Mark Glenn Evans, Ying He
, Cunjin Luo, Iryna Yevseyeva, Helge Janicke
, Efpraxia D. Zamani
, Leandros A. Maglaras
:
Real-Time Information Security Incident Management: A Case Study Using the IS-CHEC Technique. IEEE Access 7: 142147-142175 (2019) - [j17]Lee Hadlington, Masa Popovac, Helge Janicke
, Iryna Yevseyeva, Kevin I. Jones:
Exploring the role of work identity and work locus of control in information security awareness. Comput. Secur. 81: 41-48 (2019) - [j16]David Ruano-Ordás
, Iryna Yevseyeva, Vítor Basto Fernandes
, José Ramon Méndez
, Michael T. M. Emmerich:
Improving the drug discovery process by using multiple classifier systems. Expert Syst. Appl. 121: 292-303 (2019) - [j15]Mark Glenn Evans, Ying He
, Leandros A. Maglaras
, Iryna Yevseyeva, Helge Janicke
:
Evaluating information security core human error causes (IS-CHEC) technique in public sector and comparison with the private sector. Int. J. Medical Informatics 127: 109-119 (2019) - [j14]Mark Glenn Evans, Ying He
, Iryna Yevseyeva, Helge Janicke
:
Published incidents and their proportions of human error. Inf. Comput. Secur. 27(3): 343-357 (2019) - [j13]Iryna Yevseyeva, Eelke B. Lenselink
, Alice de Vries, Adriaan P. IJzerman, André H. Deutz, Michael T. M. Emmerich
:
Application of portfolio optimization to drug discovery. Inf. Sci. 475: 29-43 (2019) - [j12]David Ruano-Ordás
, Lindsey Burggraaff
, Rongfang Liu, Cas van der Horst, Laura H. Heitman, Michael T. M. Emmerich, José Ramon Méndez
, Iryna Yevseyeva, Gerard J. P. van Westen
:
A multiple classifier system identifies novel cannabinoid CB2 receptor ligands. J. Cheminformatics 11(1): 66:1-66:14 (2019) - [j11]Bruno Cruz
, Silvana Gómez Meire
, David Ruano-Ordás
, Helge Janicke
, Iryna Yevseyeva
, José Ramon Méndez
:
A Practical Approach to Protect IoT Devices against Attacks and Compile Security Incident Datasets. Sci. Program. 2019: 9067512:1-9067512:11 (2019) - [c20]Lyubomyr Chyrun, Aleksandr Gozhyj, Iryna Yevseyeva, Dmytro Dosyn, Valentin Tyhonov, Maryana Zakharchuk:
Web Content Monitoring System Development. COLINS 2019: 126-142 - [c19]Qadri Mishael
, Aladdin Ayesh
, Iryna Yevseyeva
:
Users Intention Based on Twitter Features Using Text Analytics. IDEAL (1) 2019: 121-128 - [e1]Michael Emmerich, Vasyl Lytvyn, Iryna Yevseyeva, Vítor Basto Fernandes, Dmytro Dosyn, Victoria Vysotska:
Modern Machine Learning Technologies, Workshop Proceedings of the 8th International Conference on "Mathematics. Information Technologies. Education", MoMLeT&DS-2019, Shatsk, Ukraine, June 2-4, 2019. CEUR Workshop Proceedings 2386, CEUR-WS.org 2019 [contents] - 2018
- [j10]Jiaqi Zhao
, Licheng Jiao, Fang Liu, Vítor Basto Fernandes
, Iryna Yevseyeva, Shixiong Xia, Michael T. M. Emmerich
:
3D fast convex-hull-based evolutionary multiobjective optimization algorithm. Appl. Soft Comput. 67: 322-336 (2018) - [j9]Jiaqi Zhao
, Licheng Jiao, Shixiong Xia, Vítor Basto Fernandes
, Iryna Yevseyeva, Yong Zhou, Michael T. M. Emmerich
:
Multiobjective sparse ensemble learning by means of evolutionary algorithms. Decis. Support Syst. 111: 86-100 (2018) - [c18]Vasyl Lytvyn, Dmytro Dosyn, Michael Emmerich, Iryna Yevseyeva:
Content Formation Method in the Web Systems. COLINS 2018: 42-61 - [c17]Aleksandr Gozhyj, Victoria Vysotska
, Iryna Yevseyeva, Irina Kalinina, Victor Gozhyj:
Web Resources Management Method Based on Intelligent Technologies. CSIT 2018: 206-221 - [c16]Mark Glenn Evans, Ying He, Iryna Yevseyeva, Helge Janicke:
Analysis of Published Public Sector Information Security Incidents and Breaches to establish the Proportions of Human Error. HAISA 2018: 191-202 - 2017
- [j8]Vítor Basto Fernandes, Iryna Yevseyeva, José Ramon Méndez, Jiaqi Zhao, Florentino Fdez-Riverola
, Michael T. M. Emmerich
:
Corrigendum to "A spam filtering multi-objective optimization study covering parsimony maximization and three-way classification" [Applied Soft Computing Volume 48 (2016) 111-123]. Appl. Soft Comput. 55: 565 (2017) - [j7]Jiaqi Zhao, Vítor Basto Fernandes, Licheng Jiao, Iryna Yevseyeva, Asep Maulana
, Rui Li, Thomas Bäck
, Ke Tang, Michael T. M. Emmerich
:
Corrigendum to 'Multiobjective optimization of classifiers by means of 3D convex-hull-based evolutionary algorithms' [Information Sciences volumes 367-368 (2016) 80-104]. Inf. Sci. 403: 55 (2017) - [c15]Gabriela R. Roldán-Molina
, Mario Almache-Cueva, Carlos Silva-Rabadão
, Iryna Yevseyeva, Vítor Basto Fernandes:
A Comparison of Cybersecurity Risk Analysis Tools. CENTERIS/ProjMAN/HCist 2017: 568-575 - [c14]Longmei Li, Iryna Yevseyeva, Vítor Basto Fernandes
, Heike Trautmann, Ning Jing, Michael Emmerich
:
Building and Using an Ontology of Preference-Based Multiobjective Evolutionary Algorithms. EMO 2017: 406-421 - [c13]David Ruano-Ordás
, Vítor Basto Fernandes
, Iryna Yevseyeva, José Ramon Méndez
:
Evolutionary Multi-objective Scheduling for Anti-Spam Filtering Throughput Optimization. HAIS 2017: 137-148 - [c12]Lai-Yee Liu, Vítor Basto Fernandes
, Iryna Yevseyeva, Joost N. Kok, Michael Emmerich
:
Indicator-Based Evolutionary Level Set Approximation: Mixed Mutation Strategy and Extended Analysis. IWINAC (1) 2017: 146-159 - 2016
- [j6]Vítor Basto Fernandes
, Iryna Yevseyeva, José Ramon Méndez
, Jiaqi Zhao
, Florentino Fdez-Riverola
, Michael T. M. Emmerich
:
A spam filtering multi-objective optimization study covering parsimony maximization and three-way classification. Appl. Soft Comput. 48: 111-123 (2016) - [j5]Jiaqi Zhao, Vítor Basto Fernandes
, Licheng Jiao, Iryna Yevseyeva, Asep Maulana
, Rui Li, Thomas Bäck
, Ke Tang, Michael T. M. Emmerich
:
Multiobjective optimization of classifiers by means of 3D convex-hull-based evolutionary algorithms. Inf. Sci. 367-368: 80-104 (2016) - [j4]Iryna Yevseyeva, Charles Morisset, Aad P. A. van Moorsel:
Modeling and analysis of influence power for information security decisions. Perform. Evaluation 98: 36-51 (2016) - [c11]Asep Maulana
, Valerio Gemmetto, Diego Garlaschelli
, Iryna Yevseyeva, Michael Emmerich
:
Modularities maximization in multiplex network analysis using Many-Objective Optimization. SSCI 2016: 1-8 - [i2]Longmei Li, Iryna Yevseyeva, Vítor Basto Fernandes, Heike Trautmann, Ning Jing, Michael T. M. Emmerich:
An Ontology of Preference-Based Multiobjective Evolutionary Algorithms. CoRR abs/1609.08082 (2016) - 2015
- [c10]Fernando Rosa-Sequeira, Rafael Z. Frantz
, Iryna Yevseyeva, Michael T. M. Emmerich
, Vítor Basto Fernandes
:
An EAI Based Integration Solution for Science and Research Outcomes Information Management. CENTERIS/ProjMAN/HCist 2015: 894-901 - [c9]Michael T. M. Emmerich, André H. Deutz, Iryna Yevseyeva:
A Bayesian Approach to Portfolio Selection in Multicriteria Group Decision Making. CENTERIS/ProjMAN/HCist 2015: 993-1000 - [c8]Iryna Yevseyeva, Vítor Basto Fernandes
, Michael Emmerich
, Aad van Moorsel:
Selecting Optimal Subset of Security Controls. CENTERIS/ProjMAN/HCist 2015: 1035-1042 - [c7]Vítor Basto Fernandes
, Iryna Yevseyeva, David Ruano-Ordás
, Jiaqi Zhao, Florentino Fdez-Riverola, José Ramon Méndez
, Michael T. M. Emmerich
:
Quadcriteria Optimization of Binary Classifiers: Error Rates, Coverage, and Complexity. EVOLVE 2015: 37-49 - [c6]Rafael Z. Frantz, Sandro Sawicki, Fabricia Roos-Frantz, Iryna Yevseyeva, Michael T. M. Emmerich
:
On using Markov Decision Processes to Model Integration Solutions for Disparate Resources in Software Ecosystems. ICEIS (2) 2015: 260-267 - 2014
- [c5]Iryna Yevseyeva, Charles Morisset, Thomas Groß, Aad P. A. van Moorsel:
A Decision Making Model of Influencing Behavior in Information Security. EPEW 2014: 194-208 - [c4]Charles Morisset, Thomas Groß
, Aad P. A. van Moorsel, Iryna Yevseyeva:
Nudging for Quantitative Access Control Systems. HCI (24) 2014: 340-351 - [c3]Iryna Yevseyeva, Andreia P. Guerreiro, Michael T. M. Emmerich
, Carlos M. Fonseca:
A Portfolio Optimization Approach to Selection in Multiobjective Evolutionary Algorithms. PPSN 2014: 672-681 - [c2]Charles Morisset, Iryna Yevseyeva, Thomas Groß, Aad P. A. van Moorsel:
A Formal Model for Soft Enforcement: Influencing the Decision-Maker. STM 2014: 113-128 - [i1]Jiaqi Zhao, Vítor Basto Fernandes, Licheng Jiao, Iryna Yevseyeva, Asep Maulana, Rui Li, Thomas Bäck, Michael T. M. Emmerich:
Multiobjective Optimization of Classifiers by Means of 3-D Convex Hull Based Evolutionary Algorithm. CoRR abs/1412.5710 (2014) - 2013
- [j3]Iryna Yevseyeva, Vítor Basto Fernandes
, David Ruano-Ordás
, José Ramon Méndez
:
Optimising anti-spam filters with evolutionary algorithms. Expert Syst. Appl. 40(10): 4010-4021 (2013) - [j2]Vítor Basto Fernandes
, Iryna Yevseyeva, José Ramon Méndez
:
Optimization of Anti-Spam Systems with Multiobjective Evolutionary Algorithms. Inf. Resour. Manag. J. 26(1): 54-67 (2013) - [p1]Ricardo Gamelas Sousa
, Iryna Yevseyeva, Joaquim F. Pinto da Costa, Jaime S. Cardoso:
Multicriteria Models for Learning Ordinal Data: A Literature Review. Artificial Intelligence, Evolutionary Computing and Metaheuristics 2013: 109-138 - 2011
- [c1]Iryna Yevseyeva, Vítor Basto Fernandes
, José Ramon Méndez
:
Survey on Anti-spam Single and Multi-objective Optimization. CENTERIS (2) 2011: 120-129
2000 – 2009
- 2008
- [j1]Iryna Yevseyeva, Kaisa Miettinen
, Pekka Räsänen:
Verbal ordinal classification with multicriteria decision aiding. Eur. J. Oper. Res. 185(3): 964-983 (2008)
Coauthor Index
aka: Michael Emmerich

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
load content from web.archive.org
Privacy notice: By enabling the option above, your browser will contact the API of web.archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
Tweets on dblp homepage
Show tweets from on the dblp homepage.
Privacy notice: By enabling the option above, your browser will contact twitter.com and twimg.com to load tweets curated by our Twitter account. At the same time, Twitter will persistently store several cookies with your web browser. While we did signal Twitter to not track our users by setting the "dnt" flag, we do not have any control over how Twitter uses your data. So please proceed with care and consider checking the Twitter privacy policy.
last updated on 2023-01-02 22:19 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint