Cyber threats
Cybersecurity Risks and Challenges in the Covid-19 Pandemic
Cybersecurity Risks and Challenges in the Covid-19 Pandemic In CSDM Views., 2020.
views_038.pdf — Downloaded 3193 times
Signature-based Intrusion Detection Hardware-Software Complex
Signature-based Intrusion Detection Hardware-Software Complex." Information & Security: An International Journal 47, no. 2 (2020): 221-231.
" 4715_signature-based_ids.pdf — Downloaded 3390 times
Cyber Threat Prediction with Machine Learning
Cyber Threat Prediction with Machine Learning." Information & Security: An International Journal 47, no. 2 (2020): 203-220.
" 4714_cyber_threat_assessment.pdf — Downloaded 3317 times
Tactical Approach to Cyber Defence in IoT Computer Networks
Tactical Approach to Cyber Defence in IoT Computer Networks." Information & Security: An International Journal 47, no. 1 (2020): 135-140.
" 4709_tactical_cyber_defense_iot.pdf — Downloaded 2188 times
Analysis of Cybersecurity Issues in the Maritime Industry
Analysis of Cybersecurity Issues in the Maritime Industry." Information & Security: An International Journal 47, no. 1 (2020): 27-43.
" 4702_maritime_industry_cyber_security.pdf — Downloaded 4431 times
Analysis of the Global Attack Landscape Using Data from a Telnet Honeypot
Analysis of the Global Attack Landscape Using Data from a Telnet Honeypot." Information & Security: An International Journal 43, no. 2 (2019): 264-282.
" 4320_global_botnet_attacks_landscape.pdf — Downloaded 4935 times
Comparative Research of Cybersecurity Information Sharing Models
Comparative Research of Cybersecurity Information Sharing Models." Information & Security: An International Journal 43, no. 2 (2019): 175-195.
" 4315_cybersecurity_information_sharing_models.pdf — Downloaded 3338 times
Blockchain and AI for the Next Generation Energy Grids: Cybersecurity Challenges and Opportunities
Blockchain and AI for the Next Generation Energy Grids: Cybersecurity Challenges and Opportunities." Information & Security: An International Journal 43, no. 1 (2019): 21-33.
" 4302-blockchain_ai_energy_grids.pdf — Downloaded 4433 times
DIGILIENCE - A Platform for Digital Transformation, Cyber Security and Resilience
DIGILIENCE - A Platform for Digital Transformation, Cyber Security and Resilience." Information & Security: An International Journal 43, no. 1 (2019): 7-10.
" 4300_editorial.pdf — Downloaded 4421 times
Beyond Punishment: Deterrence in the Digital Realm
Beyond Punishment: Deterrence in the Digital Realm." Connections: The Quarterly Journal 18, no. 1 (2019): 61-68.
"he Comfortable Laziness of Deterrence Theory
Can anything new and meaningful be said of deterrence? Not necessarily starting from Hermocrates of Syracuse, any analysis of deterrence has at least to notice that deterrence, narrowly understood, refers to a threat of punishment.[1] At the same, it should be noted that a wider reading acknowledges two aspects of deterrence: punishment and denial.
18.1.04_deterrence_cyber.pdf — Downloaded 946 times