Cybersecurity
Organizational Learning in the Academic Literature – Systematic Literature Review
Organizational Learning in the Academic Literature – Systematic Literature Review." Information & Security: An International Journal 46, no. 1 (2020): 65-78.
" 4605_organizational_learning.pdf — Downloaded 3617 times
A Concept for Establishing a Security Operations and Training Centre at the Bulgarian Naval Academy
A Concept for Establishing a Security Operations and Training Centre at the Bulgarian Naval Academy." Information & Security: An International Journal 46, no. 1 (2020): 27-35.
" 4602_nikolov_sotc_nvna.pdf — Downloaded 2444 times
Security Analysis of Diceware Passphrases
Security Analysis of Diceware Passphrases." Information & Security: An International Journal 47, no. 2 (2020): 276-282.
" 4719_diceware_passphrases.pdf — Downloaded 4628 times
A New Steganographic Algorithm for Hiding Messages in Music
A New Steganographic Algorithm for Hiding Messages in Music." Information & Security: An International Journal 47, no. 2 (2020): 261-275.
" 4718_hiding_messages_in_music.pdf — Downloaded 3550 times
Public Key Generation Principles Impact Cybersecurity
Public Key Generation Principles Impact Cybersecurity." Information & Security: An International Journal 47, no. 2 (2020): 249-260.
" 4717_public_key_generation.pdf — Downloaded 2941 times
One-way Function Based on Modified Cellular Automata in the Diffie-Hellman Algorithm for Big Data Exchange Tasks through Open Space
One-way Function Based on Modified Cellular Automata in the Diffie-Hellman Algorithm for Big Data Exchange Tasks through Open Space." Information & Security: An International Journal 47, no. 2 (2020): 233-246.
" 4716_diffie-hellman_big_data.pdf — Downloaded 2916 times
Signature-based Intrusion Detection Hardware-Software Complex
Signature-based Intrusion Detection Hardware-Software Complex." Information & Security: An International Journal 47, no. 2 (2020): 221-231.
" 4715_signature-based_ids.pdf — Downloaded 3794 times
Cyber Threat Prediction with Machine Learning
Cyber Threat Prediction with Machine Learning." Information & Security: An International Journal 47, no. 2 (2020): 203-220.
" 4714_cyber_threat_assessment.pdf — Downloaded 3850 times
Information Technology for Big Data Sensor Networks Stability Estimation
Information Technology for Big Data Sensor Networks Stability Estimation." Information & Security: An International Journal 47, no. 1 (2020): 141-154.
" 4710_big_data_sensor_networks_stability_estimation.pdf — Downloaded 2768 times
Tactical Approach to Cyber Defence in IoT Computer Networks
Tactical Approach to Cyber Defence in IoT Computer Networks." Information & Security: An International Journal 47, no. 1 (2020): 135-140.
" 4709_tactical_cyber_defense_iot.pdf — Downloaded 2482 times