Cyber threats
Russia’s Digital Awakening
Russia’s Digital Awakening." Connections: The Quarterly Journal 17, no. 2 (2018): 5-17.
17.2.01_chim_russia_digital_awakening.pdf — Downloaded 3015 times
"

Graphic Model of The Target Audience of Psychological Influence in Social Networks
Graphic Model of The Target Audience of Psychological Influence in Social Networks." Information & Security: An International Journal 41 (2018): 81-93.
4106_savchuk.pdf — Downloaded 2863 times
"
Methodological Foundation of State’s Information Security in Social Networking Services in Conditions of Hybrid War
Methodological Foundation of State’s Information Security in Social Networking Services in Conditions of Hybrid War." Information & Security: An International Journal 41 (2018): 61-79.
4105_hryshchuk_molodetska.pdf — Downloaded 1591 times
"
Information Sharing for Cyber Threats
Information Sharing for Cyber Threats." Information & Security: An International Journal 39, no. 1 (2018): 43-50.
3904_rizov_information_sharing.pdf — Downloaded 4617 times
"
A Software Tool ASR for a posteriori Cryptanalysis on Public Keys Generated with ‘RSA’
A Software Tool ASR for a posteriori Cryptanalysis on Public Keys Generated with ‘RSA’." Information & Security: An International Journal 37 (2017): 29-34.
3702_software_tool_asr.pdf — Downloaded 223 times
"
From Cryptology to Cyber Resilience – Bridging Theory and Practice
From Cryptology to Cyber Resilience – Bridging Theory and Practice." Information & Security: An International Journal 37 (2017): 5-7.
3700_cryptology_cyber_resilience.pdf — Downloaded 196 times
"
Hybrid War: High-tech, Information and Cyber Conflicts
Hybrid War: High-tech, Information and Cyber Conflicts." Connections: The Quarterly Journal 16, no. 2 (2017): 5-24.
Danyk, Hybrid war — Downloaded 6164 times
"
Cybersecurity: A Generic Reference Curriculum
Cybersecurity: A Generic Reference Curriculum. Kingston, ON: National Defence, 2016.
A Comprehensive Approach to Cyber Security –Trends, Challenges and the Way Forward
A Comprehensive Approach to Cyber Security –Trends, Challenges and the Way Forward." In The Dangerous Landscape, 47-61., 2013.
A Comprehensive Approach to Cyber Security — Downloaded 3594 times
"
Cyberspace as the Environment Affected by Organized Crime Activity
Cyberspace as the Environment Affected by Organized Crime Activity." Connections: The Quarterly Journal 15, no. 3 (2016): 55-64.
Cyberspace Affected by Organized Crime — Downloaded 4834 times
"
