Cybersecurity
A Governance Model for an EU Cyber Security Collaborative Network – ECSCON
A Governance Model for an EU Cyber Security Collaborative Network – ECSCON." Information & Security: An International Journal 46, no. 1 (2020): 99-113.
4607_cno-ecscon.pdf — Downloaded 3628 times
"
A Governance Model of a Collaborative Networked Organization for Cybersecurity Research
A Governance Model of a Collaborative Networked Organization for Cybersecurity Research." Information & Security: An International Journal 46, no. 1 (2020): 79-98.
4606_cyber_research_cno_yanakiev.pdf — Downloaded 3289 times
"
Organizational Learning in the Academic Literature – Systematic Literature Review
Organizational Learning in the Academic Literature – Systematic Literature Review." Information & Security: An International Journal 46, no. 1 (2020): 65-78.
4605_organizational_learning.pdf — Downloaded 4258 times
"
A Concept for Establishing a Security Operations and Training Centre at the Bulgarian Naval Academy
A Concept for Establishing a Security Operations and Training Centre at the Bulgarian Naval Academy." Information & Security: An International Journal 46, no. 1 (2020): 27-35.
4602_nikolov_sotc_nvna.pdf — Downloaded 2855 times
"
Security Analysis of Diceware Passphrases
Security Analysis of Diceware Passphrases." Information & Security: An International Journal 47, no. 2 (2020): 276-282.
4719_diceware_passphrases.pdf — Downloaded 5132 times
"
A New Steganographic Algorithm for Hiding Messages in Music
A New Steganographic Algorithm for Hiding Messages in Music." Information & Security: An International Journal 47, no. 2 (2020): 261-275.
4718_hiding_messages_in_music.pdf — Downloaded 4202 times
"
Public Key Generation Principles Impact Cybersecurity
Public Key Generation Principles Impact Cybersecurity." Information & Security: An International Journal 47, no. 2 (2020): 249-260.
4717_public_key_generation.pdf — Downloaded 3409 times
"
One-way Function Based on Modified Cellular Automata in the Diffie-Hellman Algorithm for Big Data Exchange Tasks through Open Space
One-way Function Based on Modified Cellular Automata in the Diffie-Hellman Algorithm for Big Data Exchange Tasks through Open Space." Information & Security: An International Journal 47, no. 2 (2020): 233-246.
4716_diffie-hellman_big_data.pdf — Downloaded 3410 times
"
Signature-based Intrusion Detection Hardware-Software Complex
Signature-based Intrusion Detection Hardware-Software Complex." Information & Security: An International Journal 47, no. 2 (2020): 221-231.
4715_signature-based_ids.pdf — Downloaded 4299 times
"
Cyber Threat Prediction with Machine Learning
Cyber Threat Prediction with Machine Learning." Information & Security: An International Journal 47, no. 2 (2020): 203-220.
4714_cyber_threat_assessment.pdf — Downloaded 4522 times
"