Cybersecurity
Generalized Net Model of an Automated System for Monitoring, Analysing and Managing Events Related to Information Security
Generalized Net Model of an Automated System for Monitoring, Analysing and Managing Events Related to Information Security." Information & Security: An International Journal 43, no. 2 (2019): 257-263.
" 4319_gn_model_information_security_management.pdf — Downloaded 3212 times
Cyber Situational Awareness and Information Sharing in Critical Infrastructure Organizations
Cyber Situational Awareness and Information Sharing in Critical Infrastructure Organizations." Information & Security: An International Journal 43, no. 2 (2019): 236-256.
" 4318_cyber_in_critical_infrastructure_organizations.pdf — Downloaded 3829 times
Comparative Research of Cybersecurity Information Sharing Models
Comparative Research of Cybersecurity Information Sharing Models." Information & Security: An International Journal 43, no. 2 (2019): 175-195.
" 4315_cybersecurity_information_sharing_models.pdf — Downloaded 3692 times
Utilising Experiential and Organizational Learning Theories to Improve Human Performance in Cyber Training
Utilising Experiential and Organizational Learning Theories to Improve Human Performance in Cyber Training." Information & Security: An International Journal 43, no. 2 (2019): 123-133.
" 4311_cyber_training.pdf — Downloaded 4026 times
Cooperation Model for Establishing Secure Digital Transformation in Corporations: Overview of Regulatory Issues
Cooperation Model for Establishing Secure Digital Transformation in Corporations: Overview of Regulatory Issues." Information & Security: An International Journal 43, no. 1 (2019): 98-112.
" 4309_cooperation_regulatory_issues.pdf — Downloaded 3065 times
Quantum-Based Solutions for the Next-Generation Internet
Quantum-Based Solutions for the Next-Generation Internet." Information & Security: An International Journal 43, no. 1 (2019): 62-72.
" 4306_quantum-based_internet.pdf — Downloaded 3674 times
Cryptographic Key Generation by Genetic Algorithms
Cryptographic Key Generation by Genetic Algorithms." Information & Security: An International Journal 43, no. 1 (2019): 54-61.
" 4305_genetic_algorithms_crypto.pdf — Downloaded 3534 times
Generalized Net Model of Possible Drone’s Communication Control Cyber Theft with Intuitionistic Fuzzy Estimations
Generalized Net Model of Possible Drone’s Communication Control Cyber Theft with Intuitionistic Fuzzy Estimations." Information & Security: An International Journal 43, no. 1 (2019): 35-44.
" 4303_cyberattack_drones.pdf — Downloaded 3650 times
Blockchain and AI for the Next Generation Energy Grids: Cybersecurity Challenges and Opportunities
Blockchain and AI for the Next Generation Energy Grids: Cybersecurity Challenges and Opportunities." Information & Security: An International Journal 43, no. 1 (2019): 21-33.
" 4302-blockchain_ai_energy_grids.pdf — Downloaded 4984 times
What If Blockchain Cannot Be Blocked? Cryptocurrency and International Security
What If Blockchain Cannot Be Blocked? Cryptocurrency and International Security." Information & Security: An International Journal 43, no. 1 (2019): 13-20.
" 4301_blockchain_cryptocurrency.pdf — Downloaded 4796 times