Cybersecurity
Generalized Net Model of an Automated System for Monitoring, Analysing and Managing Events Related to Information Security
Generalized Net Model of an Automated System for Monitoring, Analysing and Managing Events Related to Information Security." Information & Security: An International Journal 43, no. 2 (2019): 257-263.
" 4319_gn_model_information_security_management.pdf — Downloaded 3202 times
Cyber Situational Awareness and Information Sharing in Critical Infrastructure Organizations
Cyber Situational Awareness and Information Sharing in Critical Infrastructure Organizations." Information & Security: An International Journal 43, no. 2 (2019): 236-256.
" 4318_cyber_in_critical_infrastructure_organizations.pdf — Downloaded 3814 times
Comparative Research of Cybersecurity Information Sharing Models
Comparative Research of Cybersecurity Information Sharing Models." Information & Security: An International Journal 43, no. 2 (2019): 175-195.
" 4315_cybersecurity_information_sharing_models.pdf — Downloaded 3681 times
Utilising Experiential and Organizational Learning Theories to Improve Human Performance in Cyber Training
Utilising Experiential and Organizational Learning Theories to Improve Human Performance in Cyber Training." Information & Security: An International Journal 43, no. 2 (2019): 123-133.
" 4311_cyber_training.pdf — Downloaded 4010 times
Cooperation Model for Establishing Secure Digital Transformation in Corporations: Overview of Regulatory Issues
Cooperation Model for Establishing Secure Digital Transformation in Corporations: Overview of Regulatory Issues." Information & Security: An International Journal 43, no. 1 (2019): 98-112.
" 4309_cooperation_regulatory_issues.pdf — Downloaded 3064 times
Quantum-Based Solutions for the Next-Generation Internet
Quantum-Based Solutions for the Next-Generation Internet." Information & Security: An International Journal 43, no. 1 (2019): 62-72.
" 4306_quantum-based_internet.pdf — Downloaded 3659 times
Cryptographic Key Generation by Genetic Algorithms
Cryptographic Key Generation by Genetic Algorithms." Information & Security: An International Journal 43, no. 1 (2019): 54-61.
" 4305_genetic_algorithms_crypto.pdf — Downloaded 3516 times
Generalized Net Model of Possible Drone’s Communication Control Cyber Theft with Intuitionistic Fuzzy Estimations
Generalized Net Model of Possible Drone’s Communication Control Cyber Theft with Intuitionistic Fuzzy Estimations." Information & Security: An International Journal 43, no. 1 (2019): 35-44.
" 4303_cyberattack_drones.pdf — Downloaded 3634 times
Blockchain and AI for the Next Generation Energy Grids: Cybersecurity Challenges and Opportunities
Blockchain and AI for the Next Generation Energy Grids: Cybersecurity Challenges and Opportunities." Information & Security: An International Journal 43, no. 1 (2019): 21-33.
" 4302-blockchain_ai_energy_grids.pdf — Downloaded 4964 times
What If Blockchain Cannot Be Blocked? Cryptocurrency and International Security
What If Blockchain Cannot Be Blocked? Cryptocurrency and International Security." Information & Security: An International Journal 43, no. 1 (2019): 13-20.
" 4301_blockchain_cryptocurrency.pdf — Downloaded 4781 times