Cybersecurity
The Concept of Resilience: Security Implications and Implementation Challenges
The Concept of Resilience: Security Implications and Implementation Challenges." Connections: The Quarterly Journal 19, no. 3 (2020): 5-12.
"Assessing the Maturity of National Cybersecurity and Resilience
Assessing the Maturity of National Cybersecurity and Resilience." Connections: The Quarterly Journal 19, no. 4 (2020): 5-24.
19.4.01_sharkov_cyber_resilience_maturity.pdf — Downloaded 19 times
"Introduction

TAS: Trust Assessment System
TAS: Trust Assessment System." Information & Security: An International Journal 44 (2020): 62-75.
4406_ronchi_trust_assessment_system.pdf — Downloaded 87 times
"
Fighting the First Battle of Cyberspace Preparedness: Finding Your Reserve Cyber-Warriors
Fighting the First Battle of Cyberspace Preparedness: Finding Your Reserve Cyber-Warriors." Information & Security: An International Journal 44 (2020): 9-15.
4401_brill_fairtlough_reserve_cyber_warriors.pdf — Downloaded 20 times
"
NATO-EU Cooperation in Cybersecurity and Cyber Defence Offers Unrivalled Advantages
NATO-EU Cooperation in Cybersecurity and Cyber Defence Offers Unrivalled Advantages In Information & Security: An International Journal. Vol. 45., 2020.
4503_nato_eu_cybersecurity_cooperation.pdf — Downloaded 75 times

Hybrid Warfare and Cyber Effects in Energy Infrastructure
Hybrid Warfare and Cyber Effects in Energy Infrastructure." Connections: The Quarterly Journal 18, no. 1 (2019): 93-110.
18.1.06_hybrid_cip.pdf — Downloaded 46 times
"Introduction

Observing, Measuring and Collecting HDD Performance Metrics on a Physical Machine During Ransomware Attack
Observing, Measuring and Collecting HDD Performance Metrics on a Physical Machine During Ransomware Attack." Information & Security: An International Journal 47, no. 3 (2020): 317-327.
4723_hdd_performance_during_ransomware_attack.pdf — Downloaded 236 times
"
Design of Technical Methods for Analysing Network Security Based on Identification of Network Traffic Anomalies
Design of Technical Methods for Analysing Network Security Based on Identification of Network Traffic Anomalies." Information & Security: An International Journal 47, no. 3 (2020): 306-316.
4722_identification_network_traffic_anomalies.pdf — Downloaded 206 times
"
Cybersecurity Problems and Solutions in Operating Systems of Mobile Communications Devices
Cybersecurity Problems and Solutions in Operating Systems of Mobile Communications Devices." Information & Security: An International Journal 47, no. 3 (2020): 300-305.
4721_deauthentication_wireless_networks.pdf — Downloaded 191 times
"
Educational NASA Project: Artificial Intelligence and Cybersecurity at a Mobile Lunar Base
Educational NASA Project: Artificial Intelligence and Cybersecurity at a Mobile Lunar Base." Information & Security: An International Journal 46, no. 3 (2020): 321-333.
4624_nasa_mobile_lunar_base.pdf — Downloaded 240 times
"