Loft P., He Y., Yevseyeva I., Wagner I., CAESAR8: An agile enterprise architecture approach to managing information security risks. Computers & Security, Vol 122, November 2022, 102877, https://doi.org/10.1016/j.cose.2022.102877
Wagner I, Yevseyeva I., Designing strong privacy metric suites using evolutionary Ooptimization, ACM Transactions on Privacy and Security, 24 (2), Article 12, February 2021, https://doi.org/10.1145/3439405
Angafor G.N., Yevseyeva I., He Y., Games-based learning: A review of tabletop exercises for cybersecurity incident response training. Security and Privacy, Vol. 3 (6), 2020, https://doi.org/10.1002/spy2.126
Evans M., He Y., Luo C., Yevseyeva I., Janicke H., Zamani E., Maglaras L., Real-time information security incident managmeent: a case study using the IS-CHEC technique, IEEE Access , Vol 7, pp 142147-142175, https://doi.org/10.1109/access.2019.2944615
Evans M., He Y., Maglaras L., Yevseyeva I., Janicke H., Evaluating information security incident core human error cause (IS-CHEC), Intenational Journal of Medical Informatics, Vol. 127, July 2019, pp.109-119 https://doi.org/10.1016/j.ijmedinf.2019.04.019
Hadlington L., Popovac M., Jones K., Yevseyeva I., Janicke H., Exploring the role of work identity and work locus of ocontrol in information security awareness, Computers & Security, 2019, Vol 8., pp.41-48 https://doi.org/10.1016/j.cose.2018.10.006
Yevseyeva I, Lenselink E.B., de Vries A., IJzerman A.P., Back T., A.H. Deutz, Emmerich M.T.M., Application of portfolio optimization to drug discovery, Information Sciences, February 2019, vol. 475, pp. 29-43, https://www.dora.dmu.ac.uk/xmlui/handle/2086/16696, https://doi.org/10.1016/j.ins.2018.09.049
Zhao J., Jiao L., Liu, F. Basto-Fernandes V., Yevseyeva I., Xia S., Emmerich M.T.M. 3-D fast convex hull based evolutionary multiobjective optimization algorithm, Applied Soft Computing, June 2018, vol. 67, pp. 322-336, https://www.dora.dmu.ac.uk/xmlui/handle/2086/15932, https://doi.org/10.1016/j.asoc.2018.03.005
Yevseyeva I., Morisset C., van Moorsel A. Modeling and analysis of influence power for information security decisions. Performance Evaluation, April 2016, vol. 98, pp. 36-51, https://www.dora.dmu.ac.uk/xmlui/handle/2086/12089, https://doi.org/10.1016/j.peva.2016.01.003
Basto-Fernandes V., Yevseyeva I., Mendez J.R., Zhao J., Fdez-Riverola F. Emmerich M.T.M., A spam filtering mult-iobjective optimization study covering parsimony maximization and three-way classification, Applied Soft Computing. 2016, vol 48, pp. 111-123, https://www.dora.dmu.ac.uk/xmlui/handle/2086/12477, https://doi.org/10.1016/j.asoc.2016.06.043
Yevseyeva I., Basto-Fernandes V., van Moorsel, Janicke H., Emmerich M.T.M. Two-stage security controls selection. CENTERIS’16, 8th Conference of ENTERprise Information Systems, Procedia Computer Science, Volume 100, 2016, pages 971-978, https://www.dora.dmu.ac.uk/xmlui/handle/2086/13508, http://dx.doi.org/10.1016/j.procs.2016.09.261
Emmerich M.T.M., Deutz A., Li L., Maulana A., Yevseyeva I., Maximizing Consensus in Portfolio Selection in Multicriteria Group Decision Making. CENTERIS’16, 8th Conference of ENTERprise Information Systems, Procedia Computer Science, Volume 100, pages 848-855, https://www.dora.dmu.ac.uk/xmlui/handle/2086/13510, http://dx.doi.org/10.1016/j.procs.2016.09.234
Yevseyeva I., Turland J., Morisset C., Coventry L., Gross T., Laing C., van Moorsel A. Addressing consumerisation of IT risks with nudging. International Journal of Information Systems and Project Management. September 2015, vol. 3, N. 3, pp. 5-22, https://www.dora.dmu.ac.uk/xmlui/handle/2086/12060, http://www.sciencesphere.org/ijispm/archive/ijispm-0303.pdf.
Yevseyeva I., Guerreiro A.P., Emmerich M.T.M., Fonseca C.M. A portfolio optimization approach to selection in multiobjective evolutionary algorithms, In T. Bartz-Beielstein, J. Branke, B. Filipič, J. Smith (Eds.) “Parallel Problem Solving from Nature – PPSN XIII”, Ser. LNCS (vol. 8672), Springer, 2014, pp. 672-351, https://www.dora.dmu.ac.uk/xmlui/handle/2086/13919, https://doi.org/10.1007/978-3-319-10762-2_66
Yevseyeva I., Basto-Fernandes V., Ruano-Ordás D., Mendez J.R. Optimizing anti-spam filters with evolutionary algorithms. Expert Systems with Applications. August 2013, vol. 40, N. 10, pp. 4010-4021, https://www.dora.dmu.ac.uk/xmlui/handle/2086/13001, http://dx.doi.org/10.1016/j.eswa.2013.01.008
Yevseyeva I., Miettinen K., Rasanen P., Verbal ordinal classification with multicriteria decision aiding. European Journal of Operational Research, 2008, vol. 185, pp. 964-983, http://dx.doi.org/10.1016/j.ejor.2006.03.058.