Cyber threats
Beyond Punishment: Deterrence in the Digital Realm
Beyond Punishment: Deterrence in the Digital Realm." Connections: The Quarterly Journal 18, no. 1 (2019): 61-68.
18.1.04_deterrence_cyber.pdf — Downloaded 1498 times
"he Comfortable Laziness of Deterrence Theory
Can anything new and meaningful be said of deterrence? Not necessarily starting from Hermocrates of Syracuse, any analysis of deterrence has at least to notice that deterrence, narrowly understood, refers to a threat of punishment.[1] At the same, it should be noted that a wider reading acknowledges two aspects of deterrence: punishment and denial.

Russia’s Digital Awakening
Russia’s Digital Awakening." Connections: The Quarterly Journal 17, no. 2 (2018): 5-17.
17.2.01_chim_russia_digital_awakening.pdf — Downloaded 3976 times
"

Graphic Model of The Target Audience of Psychological Influence in Social Networks
Graphic Model of The Target Audience of Psychological Influence in Social Networks." Information & Security: An International Journal 41 (2018): 81-93.
4106_savchuk.pdf — Downloaded 3877 times
"
Methodological Foundation of State’s Information Security in Social Networking Services in Conditions of Hybrid War
Methodological Foundation of State’s Information Security in Social Networking Services in Conditions of Hybrid War." Information & Security: An International Journal 41 (2018): 61-79.
4105_hryshchuk_molodetska.pdf — Downloaded 2149 times
"
Information Sharing for Cyber Threats
Information Sharing for Cyber Threats." Information & Security: An International Journal 39, no. 1 (2018): 43-50.
3904_rizov_information_sharing.pdf — Downloaded 6477 times
"
A Software Tool ASR for a posteriori Cryptanalysis on Public Keys Generated with ‘RSA’
A Software Tool ASR for a posteriori Cryptanalysis on Public Keys Generated with ‘RSA’." Information & Security: An International Journal 37 (2017): 29-34.
3702_software_tool_asr.pdf — Downloaded 1012 times
"
From Cryptology to Cyber Resilience – Bridging Theory and Practice
From Cryptology to Cyber Resilience – Bridging Theory and Practice." Information & Security: An International Journal 37 (2017): 5-7.
3700_cryptology_cyber_resilience.pdf — Downloaded 806 times
"
Hybrid War: High-tech, Information and Cyber Conflicts
Hybrid War: High-tech, Information and Cyber Conflicts." Connections: The Quarterly Journal 16, no. 2 (2017): 5-24.
Danyk, Hybrid war — Downloaded 7748 times
"
Cybersecurity: A Generic Reference Curriculum
Cybersecurity: A Generic Reference Curriculum. Kingston, ON: National Defence, 2016.
A Comprehensive Approach to Cyber Security –Trends, Challenges and the Way Forward
A Comprehensive Approach to Cyber Security –Trends, Challenges and the Way Forward." In The Dangerous Landscape, 47-61., 2013.
A Comprehensive Approach to Cyber Security — Downloaded 4977 times
"