Cybersecurity
An innovative Airport Physical-cyber Security System (APSS)
An innovative Airport Physical-cyber Security System (APSS)." Information & Security: An International Journal 43, no. 3 (2019): 285-293.
4321_airport_physical-cyber_security_system.pdf — Downloaded 3891 times
"
Analysis of the Global Attack Landscape Using Data from a Telnet Honeypot
Analysis of the Global Attack Landscape Using Data from a Telnet Honeypot." Information & Security: An International Journal 43, no. 2 (2019): 264-282.
4320_global_botnet_attacks_landscape.pdf — Downloaded 5716 times
"
Generalized Net Model of an Automated System for Monitoring, Analysing and Managing Events Related to Information Security
Generalized Net Model of an Automated System for Monitoring, Analysing and Managing Events Related to Information Security." Information & Security: An International Journal 43, no. 2 (2019): 257-263.
4319_gn_model_information_security_management.pdf — Downloaded 3482 times
"
Cyber Situational Awareness and Information Sharing in Critical Infrastructure Organizations
Cyber Situational Awareness and Information Sharing in Critical Infrastructure Organizations." Information & Security: An International Journal 43, no. 2 (2019): 236-256.
4318_cyber_in_critical_infrastructure_organizations.pdf — Downloaded 4121 times
"
Comparative Research of Cybersecurity Information Sharing Models
Comparative Research of Cybersecurity Information Sharing Models." Information & Security: An International Journal 43, no. 2 (2019): 175-195.
4315_cybersecurity_information_sharing_models.pdf — Downloaded 3981 times
"
Utilising Experiential and Organizational Learning Theories to Improve Human Performance in Cyber Training
Utilising Experiential and Organizational Learning Theories to Improve Human Performance in Cyber Training." Information & Security: An International Journal 43, no. 2 (2019): 123-133.
4311_cyber_training.pdf — Downloaded 4386 times
"
Cooperation Model for Establishing Secure Digital Transformation in Corporations: Overview of Regulatory Issues
Cooperation Model for Establishing Secure Digital Transformation in Corporations: Overview of Regulatory Issues." Information & Security: An International Journal 43, no. 1 (2019): 98-112.
4309_cooperation_regulatory_issues.pdf — Downloaded 3318 times
"
Quantum-Based Solutions for the Next-Generation Internet
Quantum-Based Solutions for the Next-Generation Internet." Information & Security: An International Journal 43, no. 1 (2019): 62-72.
4306_quantum-based_internet.pdf — Downloaded 4074 times
"
Cryptographic Key Generation by Genetic Algorithms
Cryptographic Key Generation by Genetic Algorithms." Information & Security: An International Journal 43, no. 1 (2019): 54-61.
4305_genetic_algorithms_crypto.pdf — Downloaded 3905 times
"
Generalized Net Model of Possible Drone’s Communication Control Cyber Theft with Intuitionistic Fuzzy Estimations
Generalized Net Model of Possible Drone’s Communication Control Cyber Theft with Intuitionistic Fuzzy Estimations." Information & Security: An International Journal 43, no. 1 (2019): 35-44.
4303_cyberattack_drones.pdf — Downloaded 3990 times
"