Cyber-physical-human systems: Putting people in the loop SK Sowe, E Simmon, K Zettsu, F De Vaulx, I Bojanova IT professional 18 (1), 10-13, 2016 | 203 | 2016 |
Learning Internet-of-Things security" hands-on" C Kolias, A Stavrou, J Voas, I Bojanova, R Kuhn IEEE Security & Privacy 14 (1), 37-46, 2016 | 169 | 2016 |
Imagineering an internet of anything I Bojanova, G Hurlburt, J Voas Computer 47 (6), 72-77, 2014 | 114 | 2014 |
Cloud security: Issues and concerns P Samarati, S De Capitani di Vimercati Encyclopedia of cloud computing, 205-219, 2016 | 113 | 2016 |
The digital revolution: what's on the horizon? I Bojanova It Professional 16 (1), 8-12, 2014 | 113 | 2014 |
Bitcoin: Benefit or curse? GF Hurlburt, I Bojanova It Professional 16 (3), 10-15, 2014 | 103 | 2014 |
Encyclopedia of cloud computing S Murugesan, I Bojanova John Wiley & Sons, 2016 | 94 | 2016 |
Analysis of cloud computing delivery architecture models I Bojanova, A Samba 2011 IEEE Workshops of International Conference on Advanced Information …, 2011 | 93 | 2011 |
Cloud computing I Bojanova, J Zhang, J Voas It Professional 15 (2), 12-14, 2013 | 60 | 2013 |
The bugs framework (BF): A structured approach to express bugs I Bojanova, PE Black, Y Yesha, Y Wu 2016 IEEE International Conference on Software Quality, Reliability and …, 2016 | 45 | 2016 |
Enforcing Multitenancy for Cloud Computing Environments. J Fiaidhi, I Bojanova, J Zhang, LJ Zhang IT professional 14 (1), 2012 | 38 | 2012 |
It enhances football at world cup 2014 I Bojanova IT professional 16 (4), 12-17, 2014 | 32 | 2014 |
Trusting the internet of things I Bojanova, J Voas IT Professional 19 (5), 16-19, 2017 | 28 | 2017 |
Measurements of the most significant software security weaknesses CC Galhardo, P Mell, I Bojanova, A Gueye Proceedings of the 36th Annual Computer Security Applications Conference …, 2020 | 20 | 2020 |
Defeating buffer overflow: A trivial but dangerous bug PE Black, I Bojanova IT professional 18 (6), 58-61, 2016 | 17 | 2016 |
They know your weaknesses–do you?: Reintroducing common weakness enumeration Y Wu, I Bojanova, Y Yesha CrossTalk 45, 2015 | 17 | 2015 |
Cloud knowledge modeling and management P Bellini, D Cenni, P Nesi Encyclopedia of Cloud Computing, 640-651, 2016 | 15 | 2016 |
Bug, fault, error, or weakness: Demystifying software security vulnerabilities I Bojanova, CEC Galhardo IT Professional 25 (01), 7-12, 2023 | 13 | 2023 |
Classifying memory bugs using bugs framework approach I Bojanova, CE Galhardo 2021 IEEE 45th Annual Computers, Software, and Applications Conference …, 2021 | 12 | 2021 |
Input/output check bugs taxonomy: Injection errors in spotlight I Bojanova, CE Galhardo, S Moshtari 2021 IEEE International Symposium on Software Reliability Engineering …, 2021 | 11 | 2021 |