Cybersecurity
Information Technology for Big Data Sensor Networks Stability Estimation
Information Technology for Big Data Sensor Networks Stability Estimation." Information & Security: An International Journal 47, no. 1 (2020): 141-154.
4710_big_data_sensor_networks_stability_estimation.pdf — Downloaded 3081 times
"
Tactical Approach to Cyber Defence in IoT Computer Networks
Tactical Approach to Cyber Defence in IoT Computer Networks." Information & Security: An International Journal 47, no. 1 (2020): 135-140.
4709_tactical_cyber_defense_iot.pdf — Downloaded 2724 times
"
A Cost-Effective Approach to Securing Systems through Partial Decentralization
A Cost-Effective Approach to Securing Systems through Partial Decentralization." Information & Security: An International Journal 47, no. 1 (2020): 109-121.
4707_decentralization.pdf — Downloaded 3125 times
"
Resilience Management Framework for Critical Information Infrastructure: Designing the Level of Trust that Encourages the Exchange of Health Data
Resilience Management Framework for Critical Information Infrastructure: Designing the Level of Trust that Encourages the Exchange of Health Data." Information & Security: An International Journal 47, no. 1 (2020): 91-108.
4706_trust_health_data_exchange.pdf — Downloaded 3453 times
"
Cybernetic Approach to Developing Resilient Systems: Concept, Models and Application
Cybernetic Approach to Developing Resilient Systems: Concept, Models and Application." Information & Security: An International Journal 47, no. 1 (2020): 77-90.
4705_cybernetic_approach_resilient_systems.pdf — Downloaded 3212 times
"
Neglected Cybersecurity Risks in the Public Internet Hosting Service Providers
Neglected Cybersecurity Risks in the Public Internet Hosting Service Providers." Information & Security: An International Journal 47, no. 1 (2020): 62-76.
4704_cybersec_risks_hosting_providers.pdf — Downloaded 2945 times
"
Analysis of Cybersecurity Issues in the Maritime Industry
Analysis of Cybersecurity Issues in the Maritime Industry." Information & Security: An International Journal 47, no. 1 (2020): 27-43.
4702_maritime_industry_cyber_security.pdf — Downloaded 5595 times
"
A Logical Model for Multi-Sector Cyber Risk Management
A Logical Model for Multi-Sector Cyber Risk Management." Information & Security: An International Journal 47, no. 1 (2020): 13-26.
4701_risk_assessment_for_emaf.pdf — Downloaded 4066 times
"
How Improved Attribution in Cyber Warfare Can Help De-Escalate Cyber Arms Race
How Improved Attribution in Cyber Warfare Can Help De-Escalate Cyber Arms Race." Connections: The Quarterly Journal 19, no. 1 (2020): 87-95.
19.1.08_goel_cyber_warfare_attribution.pdf — Downloaded 3509 times
"Introduction

National Cyber Security Strategy and the Emergence of Strong Digital Borders
National Cyber Security Strategy and the Emergence of Strong Digital Borders." Connections: The Quarterly Journal 19, no. 1 (2020): 73-86.
19.1.07_cybersecurity_digital_borders.pdf — Downloaded 4312 times
"Introduction
