Connections the quarterly journal

Search form

  • Like Connections page on Facebook
  • Follow us on Twitter
  • Find connections on Istagram
  • Connect with us on LinkedIN
  • Subscribe to Connections RSS
  • English
  • Русский
  • Journal
    • Previews
    • Archive
    • Top papers
    • Athena Award
  • Submissions
    • Guidelines
    • Copyright information
    • Conflict of interest
    • Ethics in publishing
    • Themes
    • Calls for articles
    • Submit a paper
  • About
    • Mission
    • Editorial policy
    • Disclaimer
    • Editorial Board
    • Advisers
    • Author Index
    • Indexing & Archiving
    • Contact Us
    • Privacy policy
Share/Save

From Cryptology to Cyber Resilience – Bridging Theory and Practice

3700_cryptology_cyber_resilience.pdf

Publication Type:

Journal Article

Authors:

George Sharkov

Source:

Information & Security: An International Journal, Volume 37, p.5-7 (2017)
Tag: 
Cybersecurity
Cyber threats
Education & Training
Tags: 
Cybersecurity
I&S tags: 
Resilience
Cryptography
Cybersecurity
  • 3378 reads
  • Google Scholar
  • DOI
  • RTF
  • EndNote XML

Active calls for articles

Hybrid Operations

Deadline:
15.09.2025

Check also our Google Scholar profile

  • Downloads
  • How to cite
  • File Name: 3700_cryptology_cyber_resilience.pdf
    Size: 332.26 KB
    Number of Downloads: 811
APA style: Sharkov, G. (2017).  From Cryptology to Cyber Resilience – Bridging Theory and Practice. Information & Security: An International Journal. 37, 5-7.
Chicago style: Sharkov, George. "From Cryptology to Cyber Resilience – Bridging Theory and Practice." Information & Security: An International Journal 37 (2017): 5-7.
IEEE style: Sharkov, G., "From Cryptology to Cyber Resilience – Bridging Theory and Practice", Information & Security: An International Journal, vol. 37, pp. 5-7, 2017.
DOI https://doi.org/10.11610/isij.3700

Related Publications

A Hybrid Intrusion Detection with Decision Tree for Feature Selection
A Model of a Cyber Defence Awareness System of Campaigns with Malicious Information
Cryptographic Key Generation by Genetic Algorithms
Generalized Net Model of Possible Drone’s Communication Control Cyber Theft with Intuitionistic Fuzzy Estimations
Cybersecurity: A Generic Reference Curriculum
Cybersecurity Innovation in NATO: Lessons Learned and Recommendations
Challenges to Human Factor for Advance Persistent Threats Proactive Identification in Modern Social Networks
  • Trending
  • Latest
  • Most cited
  • The Weaponization of Emerging Technologies and Their Impact on Global Risk: A Perspective from the PfPC Emerging Security Challenges Working Group (1,696)
  • Goodbye Globalization? Hello 'Fragmentegration'! - The World Economy and Strategic Competition (1,267)
  • Towards a New Role for the European Union in the South Caucasus? (1,263)
  • Hybrid Threats and Strategic Competition (1,220)
  • The PfP Consortium Regional Stability in South East Europe Working Group at 25: The Transformed Balkans and the Work Ahead (1,172)
view all
  • Communicating (In)Security in Ukraine
  • Hybrid Warfare in the Black Sea Region: Russian Information-Psychological Operations in Georgia
  • Ukraine's Component in the Platform of European Memory and Conscience
  • Kremlin's 'War on Terrorism' in the Northeastern Caucasus: How Chechnya Still 'Saves' Russia
  • A Theory of Change: 25 Years of the Partnership for Peace Consortium
view all
Introduction to Program-based Defense Resource Management (8)
The Art of Shaping Defense Policy: Scope, Components, Relationships (but no Algorithms) (6)
NATO and the South Caucasus: Armenia, Azerbaijan, and Georgia on Different Tracks (5)
Terror-Crime Nexus? Terrorism and Arms, Drug, and Human Trafficking in Georgia (4)
Terrorist Routes in Central Asia: Trafficking Drugs, Humans, and Weapons (4)
view all

© Partnership for Peace Consortium of Defense Academies and Security Studies Institutes, 2012-2025
This site was designed and is maintained by Procon Ltd., Executive publisher of Connections: The Quarterly Journal