Loft P., He Y., Yevseyeva I., Wagner I., CAESAR8: An agile enterprise architecture approach to managing information security risks. Computers & Security, Vol 122, November 2022, 102877,
Wagner I, Yevseyeva I., Designing strong privacy metric suites using evolutionary Ooptimization, ACM Transactions on Privacy and Security, 24 (2), Article 12, February 2021,
Angafor G.N., Yevseyeva I., He Y., Games-based learning: A review of tabletop exercises for cybersecurity incident response training. Security and Privacy, Vol. 3 (6), 2020,
Evans M., He Y., Luo C., Yevseyeva I., Janicke H., Zamani E., Maglaras L., Real-time information security incident managmeent: a case study using the IS-CHEC technique, IEEE Access , Vol 7, pp 142147-142175,
Evans M., He Y., Maglaras L., Yevseyeva I., Janicke H., Evaluating information security incident core human error cause (IS-CHEC), Intenational Journal of Medical Informatics, Vol. 127, July 2019, pp.109-119
Hadlington L., Popovac M., Jones K., Yevseyeva I., Janicke H., Exploring the role of work identity and work locus of ocontrol in information security awareness, Computers & Security, 2019, Vol 8., pp.41-48
Yevseyeva I, Lenselink E.B., de Vries A., IJzerman A.P., Back T., A.H. Deutz, Emmerich M.T.M., Application of portfolio optimization to drug discovery, Information Sciences, February 2019, vol. 475, pp. 29-43, ,
Zhao J., Jiao L., Liu, F. Basto-Fernandes V., Yevseyeva I., Xia S., Emmerich M.T.M. 3-D fast convex hull based evolutionary multiobjective optimization algorithm, Applied Soft Computing, June 2018, vol. 67, pp. 322-336, ,
Yevseyeva I., Morisset C., van Moorsel A. Modeling and analysis of influence power for information security decisions. Performance Evaluation, April 2016, vol. 98, pp. 36-51, ,
Basto-Fernandes V., Yevseyeva I., Mendez J.R., Zhao J., Fdez-Riverola F. Emmerich M.T.M., A spam filtering mult-iobjective optimization study covering parsimony maximization and three-way classification, Applied Soft Computing. 2016, vol 48, pp. 111-123, ,
Yevseyeva I., Basto-Fernandes V., van Moorsel, Janicke H., Emmerich M.T.M. Two-stage security controls selection. CENTERIS’16, 8th Conference of ENTERprise Information Systems, Procedia Computer Science, Volume 100, 2016, pages 971-978, ,
Emmerich M.T.M., Deutz A., Li L., Maulana A., Yevseyeva I., Maximizing Consensus in Portfolio Selection in Multicriteria Group Decision Making. CENTERIS’16, 8th Conference of ENTERprise Information Systems, Procedia Computer Science, Volume 100, pages 848-855, ,
Yevseyeva I., Turland J., Morisset C., Coventry L., Gross T., Laing C., van Moorsel A. Addressing consumerisation of IT risks with nudging. International Journal of Information Systems and Project Management. September 2015, vol. 3, N. 3, pp. 5-22, , .
Yevseyeva I., Guerreiro A.P., Emmerich M.T.M., Fonseca C.M. A portfolio optimization approach to selection in multiobjective evolutionary algorithms, In T. Bartz-Beielstein, J. Branke, B. Filipič, J. Smith (Eds.) “Parallel Problem Solving from Nature – PPSN XIII”, Ser. LNCS (vol. 8672), Springer, 2014, pp. 672-351, ,
Yevseyeva I., Basto-Fernandes V., Ruano-Ordás D., Mendez J.R. Optimizing anti-spam filters with evolutionary algorithms. Expert Systems with Applications. August 2013, vol. 40, N. 10, pp. 4010-4021, ,
Yevseyeva I., Miettinen K., Rasanen P., Verbal ordinal classification with multicriteria decision aiding. European Journal of Operational Research, 2008, vol. 185, pp. 964-983, .