Information security
Launching Narrative into the Information Battlefield
Launching Narrative into the Information Battlefield." Connections: The Quarterly Journal 21, no. 2 (2022): 111-122.
"Introduction
21.2.08_launching_narrative_f.pdf — Downloaded 600 times
A Hybrid Intrusion Detection with Decision Tree for Feature Selection
A Hybrid Intrusion Detection with Decision Tree for Feature Selection In Information & Security: An International Journal. Vol. 49., 2021.
4901_a_hybrid_id_with_decision_tree_for_fs_preview.pdf — Downloaded 2553 times
Design of Technical Methods for Analysing Network Security Based on Identification of Network Traffic Anomalies
Design of Technical Methods for Analysing Network Security Based on Identification of Network Traffic Anomalies." Information & Security: An International Journal 47, no. 3 (2020): 306-316.
" 4722_identification_network_traffic_anomalies.pdf — Downloaded 2748 times
Using the Cyber Situational Awareness Concept for Protection of Agricultural Enterprise Management Information Systems
Using the Cyber Situational Awareness Concept for Protection of Agricultural Enterprise Management Information Systems." Information & Security: An International Journal 46, no. 2 (2020): 168-181.
" 4612_sa_agricultural.pdf — Downloaded 2816 times
MonSys: A Scalable Platform for Monitoring Digital Services Availability, Threat Intelligence and Cyber Resilience Situational Awareness
MonSys: A Scalable Platform for Monitoring Digital Services Availability, Threat Intelligence and Cyber Resilience Situational Awareness." Information & Security: An International Journal 46, no. 2 (2020): 155-167.
" 4611_monsys.pdf — Downloaded 3124 times
Security Analysis of Diceware Passphrases
Security Analysis of Diceware Passphrases." Information & Security: An International Journal 47, no. 2 (2020): 276-282.
" 4719_diceware_passphrases.pdf — Downloaded 4732 times
A New Steganographic Algorithm for Hiding Messages in Music
A New Steganographic Algorithm for Hiding Messages in Music." Information & Security: An International Journal 47, no. 2 (2020): 261-275.
" 4718_hiding_messages_in_music.pdf — Downloaded 3682 times
One-way Function Based on Modified Cellular Automata in the Diffie-Hellman Algorithm for Big Data Exchange Tasks through Open Space
One-way Function Based on Modified Cellular Automata in the Diffie-Hellman Algorithm for Big Data Exchange Tasks through Open Space." Information & Security: An International Journal 47, no. 2 (2020): 233-246.
" 4716_diffie-hellman_big_data.pdf — Downloaded 3008 times
Adopting Machine Learning for Images Transferred with LoRaWAN
Adopting Machine Learning for Images Transferred with LoRaWAN." Information & Security: An International Journal 47, no. 2 (2020): 172-186.
" 4712_adopting_machine_learning_for_images.pdf — Downloaded 2939 times
Neglected Cybersecurity Risks in the Public Internet Hosting Service Providers
Neglected Cybersecurity Risks in the Public Internet Hosting Service Providers." Information & Security: An International Journal 47, no. 1 (2020): 62-76.
" 4704_cybersec_risks_hosting_providers.pdf — Downloaded 2718 times