Cyber threats
Russia’s Digital Awakening
Russia’s Digital Awakening." Connections: The Quarterly Journal 17, no. 2 (2018): 5-17.
"
17.2.01_chim_russia_digital_awakening.pdf — Downloaded 3255 times
Graphic Model of The Target Audience of Psychological Influence in Social Networks
Graphic Model of The Target Audience of Psychological Influence in Social Networks." Information & Security: An International Journal 41 (2018): 81-93.
" 4106_savchuk.pdf — Downloaded 3123 times
Methodological Foundation of State’s Information Security in Social Networking Services in Conditions of Hybrid War
Methodological Foundation of State’s Information Security in Social Networking Services in Conditions of Hybrid War." Information & Security: An International Journal 41 (2018): 61-79.
" 4105_hryshchuk_molodetska.pdf — Downloaded 1697 times
Information Sharing for Cyber Threats
Information Sharing for Cyber Threats." Information & Security: An International Journal 39, no. 1 (2018): 43-50.
" 3904_rizov_information_sharing.pdf — Downloaded 5018 times
A Software Tool ASR for a posteriori Cryptanalysis on Public Keys Generated with ‘RSA’
A Software Tool ASR for a posteriori Cryptanalysis on Public Keys Generated with ‘RSA’." Information & Security: An International Journal 37 (2017): 29-34.
" 3702_software_tool_asr.pdf — Downloaded 403 times
From Cryptology to Cyber Resilience – Bridging Theory and Practice
From Cryptology to Cyber Resilience – Bridging Theory and Practice." Information & Security: An International Journal 37 (2017): 5-7.
" 3700_cryptology_cyber_resilience.pdf — Downloaded 322 times
Hybrid War: High-tech, Information and Cyber Conflicts
Hybrid War: High-tech, Information and Cyber Conflicts." Connections: The Quarterly Journal 16, no. 2 (2017): 5-24.
" Danyk, Hybrid war — Downloaded 6523 times
Cybersecurity: A Generic Reference Curriculum
Cybersecurity: A Generic Reference Curriculum. Kingston, ON: National Defence, 2016.
A Comprehensive Approach to Cyber Security –Trends, Challenges and the Way Forward
A Comprehensive Approach to Cyber Security –Trends, Challenges and the Way Forward." In The Dangerous Landscape, 47-61., 2013.
" A Comprehensive Approach to Cyber Security — Downloaded 3871 times
Cyberspace as the Environment Affected by Organized Crime Activity
Cyberspace as the Environment Affected by Organized Crime Activity." Connections: The Quarterly Journal 15, no. 3 (2016): 55-64.
"
Cyberspace Affected by Organized Crime — Downloaded 5135 times