Cyber threats
Cybersecurity Risks and Challenges in the Covid-19 Pandemic
Cybersecurity Risks and Challenges in the Covid-19 Pandemic In CSDM Views., 2020.
views_038.pdf — Downloaded 2570 times

Signature-based Intrusion Detection Hardware-Software Complex
Signature-based Intrusion Detection Hardware-Software Complex." Information & Security: An International Journal 47, no. 2 (2020): 221-231.
4715_signature-based_ids.pdf — Downloaded 2968 times
"
Cyber Threat Prediction with Machine Learning
Cyber Threat Prediction with Machine Learning." Information & Security: An International Journal 47, no. 2 (2020): 203-220.
4714_cyber_threat_assessment.pdf — Downloaded 2679 times
"
Tactical Approach to Cyber Defence in IoT Computer Networks
Tactical Approach to Cyber Defence in IoT Computer Networks." Information & Security: An International Journal 47, no. 1 (2020): 135-140.
4709_tactical_cyber_defense_iot.pdf — Downloaded 1831 times
"
Analysis of Cybersecurity Issues in the Maritime Industry
Analysis of Cybersecurity Issues in the Maritime Industry." Information & Security: An International Journal 47, no. 1 (2020): 27-43.
4702_maritime_industry_cyber_security.pdf — Downloaded 3485 times
"
Analysis of the Global Attack Landscape Using Data from a Telnet Honeypot
Analysis of the Global Attack Landscape Using Data from a Telnet Honeypot." Information & Security: An International Journal 43, no. 2 (2019): 264-282.
4320_global_botnet_attacks_landscape.pdf — Downloaded 4397 times
"
Comparative Research of Cybersecurity Information Sharing Models
Comparative Research of Cybersecurity Information Sharing Models." Information & Security: An International Journal 43, no. 2 (2019): 175-195.
4315_cybersecurity_information_sharing_models.pdf — Downloaded 2903 times
"
Blockchain and AI for the Next Generation Energy Grids: Cybersecurity Challenges and Opportunities
Blockchain and AI for the Next Generation Energy Grids: Cybersecurity Challenges and Opportunities." Information & Security: An International Journal 43, no. 1 (2019): 21-33.
4302-blockchain_ai_energy_grids.pdf — Downloaded 3917 times
"
DIGILIENCE - A Platform for Digital Transformation, Cyber Security and Resilience
DIGILIENCE - A Platform for Digital Transformation, Cyber Security and Resilience." Information & Security: An International Journal 43, no. 1 (2019): 7-10.
4300_editorial.pdf — Downloaded 3782 times
"
Beyond Punishment: Deterrence in the Digital Realm
Beyond Punishment: Deterrence in the Digital Realm." Connections: The Quarterly Journal 18, no. 1 (2019): 61-68.
18.1.04_deterrence_cyber.pdf — Downloaded 675 times
"he Comfortable Laziness of Deterrence Theory
Can anything new and meaningful be said of deterrence? Not necessarily starting from Hermocrates of Syracuse, any analysis of deterrence has at least to notice that deterrence, narrowly understood, refers to a threat of punishment.[1] At the same, it should be noted that a wider reading acknowledges two aspects of deterrence: punishment and denial.
