Cyber security training for critical infrastructure protection: A literature review N Chowdhury, V Gkioulos Computer Science Review 40, 100361, 2021 | 150 | 2021 |
Modeling effective cybersecurity training frameworks: A delphi method-based study N Chowdhury, S Katsikas, V Gkioulos Computers & Security 113, 102551, 2022 | 57 | 2022 |
Key competencies for critical infrastructure cyber-security: a systematic literature review N Chowdhury, V Gkioulos Information & Computer Security 29 (5), 697-723, 2021 | 29 | 2021 |
Cybersecurity training in Norwegian critical infrastructure companies N Chowdhury, E Nystad, K Reegård, V Gkioulos | 22 | 2022 |
Threat analysis for smart homes G Kavallieratos, N Chowdhury, S Katsikas, V Gkioulos, S Wolthusen Future Internet 11 (10), 207, 2019 | 19 | 2019 |
A personalized learning theory-based cyber-security training exercise N Chowdhury, V Gkioulos International Journal of Information Security 22 (6), 1531-1546, 2023 | 11 | 2023 |
CS measures for nuclear power plant protection: A systematic literature review N Chowdhury Signals 2 (4), 803-819, 2021 | 8 | 2021 |
A survey of cryptography-based authentication for smart grid communication N Chowdhury Computer Security: ESORICS 2020 International Workshops, CyberICPS, SECPRE …, 2020 | 5 | 2020 |
A Framework for Developing Tabletop Cybersecurity Exercises N Chowdhury, V Gkioulos European Symposium on Research in Computer Security, 116-133, 2022 | 4 | 2022 |
A modular cyber security training programme for the maritime domain A Oruc, N Chowdhury, V Gkioulos International Journal of Information Security 23 (2), 1477-1512, 2024 | 3 | 2024 |
Cybersecurity Training for Critical Infrastructure Protection N Chowdhury NTNU, 2023 | 1 | 2023 |
Benefits of PLT for Cyber-Security Training N Chowdhury, V Gkioulos, E Nystad, S Katsikas Research Square. https://doi. org/10.21203/rs, 2022 | 1 | 2022 |