Seguir
Linas Bukauskas
Linas Bukauskas
Assoc. prof. Vilnius University, Institute of Computer Science, Didlaukio 47, Vilnius, Lithuania
Dirección de correo verificada de mif.vu.lt - Página principal
Título
Citado por
Citado por
Año
A Framework for Competence Development and Assessment in Hybrid Cybersecurity Exercises
A Brilingaitė, L Bukauskas, A Juozapavičius
Computers & Security 88, 101607, 2019
582019
Competency Assessment in Problem-Based Learning Projects of Information Technologies Students.
A BRILINGAITĖ, L Bukauskas, A JUŠKEVIČIENĖ
Informatics in Education 17 (1), 2018
432018
An optimal (k, n) visual secret sharing scheme for information security
ME Hodeish, L Bukauskas, VT Humbe
Procedia computer science 93, 760-767, 2016
272016
3D visual data mining—goals and experiences
M Böhlen, L Bukauskas, PS Eriksen, SL Lauritzen, A Mažeika, P Musaeus, ...
Computational statistics & data analysis 43 (4), 445-469, 2003
222003
Environment for cybersecurity tabletop exercises
A Brilingaitė, L Bukauskas, V Krinickij, E Kutka
ECGBL 2017 11th European Conference on Game-Based Learning, 47-55, 2017
172017
Overcoming information-sharing challenges in cyber defence exercises
A Brilingaitė, L Bukauskas, A Juozapavičius, E Kutka
Journal of Cybersecurity 8 (1), tyac001, 2022
162022
Development of an Educational Platform for Cyber Defence Training
A Brilingaitė, L Bukauskas, E Kutka
ECCWS 2017 16th European Conference on Cyber Warfare and Security, 73, 2017
112017
The Jungle database search engine
M Böhlen, L Bukauskas, C Dyreson
ACM SIGMOD Record 28 (2), 584-586, 1999
111999
Age and gender impact on password hygiene
A Juozapavičius, A Brilingaitė, L Bukauskas, RG Lugo
Applied Sciences 12 (2), 894, 2022
82022
Remapping cybersecurity competences in a small nation state
L Bukauskas, A Brilingaitė, A Juozapavičius, D Lepaitė, K Ikamas, ...
Heliyon 9 (1), e12808, 2023
72023
A New Efficient TKHC-based Image Sharing Scheme over Unsecured Channel
ME Hodeish, L Bukauskas, VT Humbe
Journal of King Saud University-Computer and Information Sciences 34 (4 …, 2022
72022
iTopN: Incremental extraction of the N most visible objects
L Bukauskas, L Mark, E Omiecinski, MH Böhlen
Proceedings of the twelfth international conference on Information and …, 2003
72003
Detection of premeditated security vulnerabilities in mobile applications
A Brilingaitė, L Bukauskas, E Kutka
ECCWS 2019 18th European Conference on Cyber Warfare and Security, 63, 2019
52019
Location-based story telling for mobile tourist
S Budvytyte, L Bukauskas
2006 7th International Baltic Conference on Databases and Information …, 2006
52006
Digital human in cybersecurity risk assessment
A Jurevičienė, A Brilingaitė, L Bukauskas
International Conference on Human-Computer Interaction, 418-432, 2021
42021
Observer relative data extraction
L Bukauskas, MH Böhlen
Observer Relative Data Extraction, 2001
42001
Test-data generation and integration for long-distance e-vehicle routing
A Barauskas, A Brilingaitė, L Bukauskas, V Čeikutė, A Čivilis, S Šaltenis
GeoInformatica 27 (4), 737-758, 2023
32023
A multidimensional Cyber Defense Exercise: Emphasis on emotional, social, and cognitive aspects
K Maennel, A Brilingaitė, L Bukauskas, A Juozapavičius, BJ Knox, ...
SAGE Open 13 (1), 21582440231156367, 2023
32023
Cyber security table-top exercise gamification with dynamic scenario for qualification assessment
G Kvietinskaitė, L Bukauskas, V Krinickij
International Conference on Human-Computer Interaction, 54-62, 2022
32022
Time-Line Alignment of Cyber Incidents in Heterogeneous Environments
A Brilingaitė, L Bukauskas, E Kutka
ECCWS 2018 17th European Conference on Cyber Warfare and Security V2, 57, 2018
32018
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20