Follow
Livinus Obiora Nweke
Livinus Obiora Nweke
Associate Professor, Noroff University College
Verified email at noroff.no
Title
Cited by
Cited by
Year
Using the CIA and AAA Models to Explain Cybersecurity Activities
LO Nweke
592017
System security assurance: A systematic literature review
A Shukla, B Katt, LO Nweke, PK Yeng, GK Weldehawaryat
Computer Science Review 45, 100496, 2022
382022
A Review of Asset-Centric Threat Modelling Approaches
LO Nweke, SD Wolthusen
International Journal of Advanced Computer Science and Applications 11 (2), 1-6, 2020
382020
Applying Software-Defined Networking to Support Telemedicine Health Consultation During and Post Covid-19 Era
BA Jnr., LO Nweke, MA Al-Sharafi
Health and Technology, 2020
352020
Legal Issues Related to Cyber Threat Information Sharing Among Private Entities for Critical Infrastructure Protection
LO Nweke, S Wolthusen
12th International Conference on Cyber Conflict, CyCon 2020; Virtual, Online …, 2020
322020
Investigating the effectiveness of a HyFlex cyber security training in a developing country: A case study
LO Nweke, AJ Bokolo, G Mba, E Nwigwe
Education and Information Technologies 27 (7), 10107-10133, 2022
222022
Data-Driven and Artificial Intelligence (AI) Approach for Modelling and Analyzing Healthcare Security Practice: A Systematic Review
P Yeng, LO Nweke, AZ Woldaregay, B Yang, EA Snekkenes
Intelligent Systems Conference (IntelliSys), Amsterdam, Netherlands, 2020
212020
A comparison of primary stakeholders views on the deployment of biometrics technology in border management: Case study of smart mobility at the European land borders
M Abomhara, SY Yayilgan, LO Nweke, Z Székely
Technology in Society 64, 2021
202021
Understanding Attribute-Based Access Control for Modelling and Analysing Healthcare Professionals' Security Practices
LO Nweke, P Yeng, S Wolthusen, B Yang
International Journal of Advanced Computer Science and Applications 11 (2 …, 2020
142020
The Ethics of Information Systems: The Present State of the Discussion and Avenues for Future Work
A Bock, J Gulden, S Espana, K Jahn, LO Nweke, A Richter
29th European Conference on Information Systems (ECIS 2021), Marrakech, Morocco, 2021
132021
Vulnerability Discovery Modelling With Vulnerability Severity
A Shukla, B Katt, LO Nweke
Institute of Electrical and Electronics Engineers (IEEE), 2019
132019
A Survey of Specification-based Intrusion Detection Techniques for Cyber-Physical Systems
LO Nweke
International Journal of Advanced Computer Science and Applications 12 (5 …, 2021
122021
Artificial intelligence–based framework for analyzing health care staff security practice: Mapping review and simulation study
PK Yeng, LO Nweke, B Yang, M Ali Fauzi, EA Snekkenes
JMIR medical informatics 9 (12), e19250, 2021
112021
Threat Modelling of Cyber-Physical Systems Using an Applied Pi-Calculus
LO Nweke, GK Weldehawaryat, S Wolthusen
International Journal of Critical Infrastructure Protection, 2021
112021
A LINDDUN-Based Privacy Threat Modelling for National Identification Systems
LO Nweke, M Abomhara, SY Yayilgan, D Comparin, O Heurtier, C Bunney
2022 IEEE Nigeria 4th International Conference on Disruptive Technologies …, 2022
72022
Modelling Adversarial Flow in Software-Defined Industrial Control Networks Using a Queueing Network Model
LO Nweke, S Wolthusen
IEEE Conference on Communications and Network Security, Avignon, France, 2020
72020
Adversary Model for Attacks Against IEC 61850 Real-Time Communication Protocols
LO Nweke, GK Weldehawaryat, S Wolthusen
International Conference on the Design of Reliable Communication Networks …, 2020
62020
Ethical Implications of Security Vulnerability Research for Critical Infrastructure Protection
LO Nweke, S Wolthusen
WI2020 Community Tracks, 331-340, 2020
42020
Resilience Analysis of Software-Defined Networks Using Queueing Networks
LO Nweke, S Wolthusen
Conference: International Conference on Computing, Networking and …, 2020
42020
National Identification Systems As Enablers of Online Identity
LO Nweke
Online Identity - An Essential Guide, 2023
22023
The system can't perform the operation now. Try again later.
Articles 1–20