Cybersecurity
Cyberwarriors: The Backbone of the Future Military or a Misnomer?
Cyberwarriors: The Backbone of the Future Military or a Misnomer?" Information & Security: An International Journal 44 (2020): 17-26.
"Fighting the First Battle of Cyberspace Preparedness: Finding Your Reserve Cyber-Warriors
Fighting the First Battle of Cyberspace Preparedness: Finding Your Reserve Cyber-Warriors." Information & Security: An International Journal 44 (2020): 9-15.
4401_brill_fairtlough_reserve_cyber_warriors.pdf — Downloaded 413 times
"
The Human Factor in the Integrated Approach to Cyberdefence
The Human Factor in the Integrated Approach to Cyberdefence." Information & Security: An International Journal 44 (2020): 5-6.
4400_yanakiev_editorial.pdf — Downloaded 332 times
"
NATO-EU Cooperation in Cybersecurity and Cyber Defence Offers Unrivalled Advantages
NATO-EU Cooperation in Cybersecurity and Cyber Defence Offers Unrivalled Advantages." Information & Security: An International Journal 45 (2020): 35-55.
4503_nato_eu_cybersecurity_cooperation.pdf — Downloaded 2433 times
"
Hybrid Warfare and Cyber Effects in Energy Infrastructure
Hybrid Warfare and Cyber Effects in Energy Infrastructure." Connections: The Quarterly Journal 18, no. 1 (2019): 93-110.
18.1.06_hybrid_cip.pdf — Downloaded 784 times
"Introduction
Discussions of hybrid warfare have often centered on definitional debates over the precise nature of the term, and whether ‘hybrid’ covers what other military experts describe as nonlinear warfare, full-spectrum warfare, fourth-generation warfare, or other such terms. Similarly, discussions of cyber conflict have treated the phenomenon as a separate domain, as if using cyber tools remained distinct from other forms of conflict.

Observing, Measuring and Collecting HDD Performance Metrics on a Physical Machine During Ransomware Attack
Observing, Measuring and Collecting HDD Performance Metrics on a Physical Machine During Ransomware Attack." Information & Security: An International Journal 47, no. 3 (2020): 317-327.
4723_hdd_performance_during_ransomware_attack.pdf — Downloaded 1847 times
"
Design of Technical Methods for Analysing Network Security Based on Identification of Network Traffic Anomalies
Design of Technical Methods for Analysing Network Security Based on Identification of Network Traffic Anomalies." Information & Security: An International Journal 47, no. 3 (2020): 306-316.
4722_identification_network_traffic_anomalies.pdf — Downloaded 1835 times
"
Cybersecurity Problems and Solutions in Operating Systems of Mobile Communications Devices
Cybersecurity Problems and Solutions in Operating Systems of Mobile Communications Devices." Information & Security: An International Journal 47, no. 3 (2020): 300-305.
4721_deauthentication_wireless_networks.pdf — Downloaded 2080 times
"
Educational NASA Project: Artificial Intelligence and Cybersecurity at a Mobile Lunar Base
Educational NASA Project: Artificial Intelligence and Cybersecurity at a Mobile Lunar Base." Information & Security: An International Journal 46, no. 3 (2020): 321-333.
4624_nasa_mobile_lunar_base.pdf — Downloaded 1786 times
"
Comparison between the Cyber Operations Majors in the United States Naval Academy and the Bulgarian Naval Academy
Comparison between the Cyber Operations Majors in the United States Naval Academy and the Bulgarian Naval Academy." Information & Security: An International Journal 46, no. 3 (2020): 311-320.
4623_comparison_cyber_operations_majors.pdf — Downloaded 2021 times
"