Cybersecurity
Cyberwarriors: The Backbone of the Future Military or a Misnomer?
Cyberwarriors: The Backbone of the Future Military or a Misnomer?" Information & Security: An International Journal 44 (2020): 17-26.
"Fighting the First Battle of Cyberspace Preparedness: Finding Your Reserve Cyber-Warriors
Fighting the First Battle of Cyberspace Preparedness: Finding Your Reserve Cyber-Warriors." Information & Security: An International Journal 44 (2020): 9-15.
" 4401_brill_fairtlough_reserve_cyber_warriors.pdf — Downloaded 595 times
The Human Factor in the Integrated Approach to Cyberdefence
The Human Factor in the Integrated Approach to Cyberdefence." Information & Security: An International Journal 44 (2020): 5-6.
" 4400_yanakiev_editorial.pdf — Downloaded 525 times
NATO-EU Cooperation in Cybersecurity and Cyber Defence Offers Unrivalled Advantages
NATO-EU Cooperation in Cybersecurity and Cyber Defence Offers Unrivalled Advantages." Information & Security: An International Journal 45 (2020): 35-55.
" 4503_nato_eu_cybersecurity_cooperation.pdf — Downloaded 3021 times
Hybrid Warfare and Cyber Effects in Energy Infrastructure
Hybrid Warfare and Cyber Effects in Energy Infrastructure." Connections: The Quarterly Journal 18, no. 1 (2019): 93-110.
"Introduction
Discussions of hybrid warfare have often centered on definitional debates over the precise nature of the term, and whether ‘hybrid’ covers what other military experts describe as nonlinear warfare, full-spectrum warfare, fourth-generation warfare, or other such terms. Similarly, discussions of cyber conflict have treated the phenomenon as a separate domain, as if using cyber tools remained distinct from other forms of conflict.
18.1.06_hybrid_cip.pdf — Downloaded 1380 times
Observing, Measuring and Collecting HDD Performance Metrics on a Physical Machine During Ransomware Attack
Observing, Measuring and Collecting HDD Performance Metrics on a Physical Machine During Ransomware Attack." Information & Security: An International Journal 47, no. 3 (2020): 317-327.
" 4723_hdd_performance_during_ransomware_attack.pdf — Downloaded 2362 times
Design of Technical Methods for Analysing Network Security Based on Identification of Network Traffic Anomalies
Design of Technical Methods for Analysing Network Security Based on Identification of Network Traffic Anomalies." Information & Security: An International Journal 47, no. 3 (2020): 306-316.
" 4722_identification_network_traffic_anomalies.pdf — Downloaded 2333 times
Cybersecurity Problems and Solutions in Operating Systems of Mobile Communications Devices
Cybersecurity Problems and Solutions in Operating Systems of Mobile Communications Devices." Information & Security: An International Journal 47, no. 3 (2020): 300-305.
" 4721_deauthentication_wireless_networks.pdf — Downloaded 2733 times
Educational NASA Project: Artificial Intelligence and Cybersecurity at a Mobile Lunar Base
Educational NASA Project: Artificial Intelligence and Cybersecurity at a Mobile Lunar Base." Information & Security: An International Journal 46, no. 3 (2020): 321-333.
" 4624_nasa_mobile_lunar_base.pdf — Downloaded 2444 times
Comparison between the Cyber Operations Majors in the United States Naval Academy and the Bulgarian Naval Academy
Comparison between the Cyber Operations Majors in the United States Naval Academy and the Bulgarian Naval Academy." Information & Security: An International Journal 46, no. 3 (2020): 311-320.
" 4623_comparison_cyber_operations_majors.pdf — Downloaded 2656 times