Cybersecurity
An innovative Airport Physical-cyber Security System (APSS)
An innovative Airport Physical-cyber Security System (APSS)." Information & Security: An International Journal 43, no. 3 (2019): 285-293.
4321_airport_physical-cyber_security_system.pdf — Downloaded 4098 times
"
Analysis of the Global Attack Landscape Using Data from a Telnet Honeypot
Analysis of the Global Attack Landscape Using Data from a Telnet Honeypot." Information & Security: An International Journal 43, no. 2 (2019): 264-282.
4320_global_botnet_attacks_landscape.pdf — Downloaded 5861 times
"
Generalized Net Model of an Automated System for Monitoring, Analysing and Managing Events Related to Information Security
Generalized Net Model of an Automated System for Monitoring, Analysing and Managing Events Related to Information Security." Information & Security: An International Journal 43, no. 2 (2019): 257-263.
4319_gn_model_information_security_management.pdf — Downloaded 3637 times
"
Cyber Situational Awareness and Information Sharing in Critical Infrastructure Organizations
Cyber Situational Awareness and Information Sharing in Critical Infrastructure Organizations." Information & Security: An International Journal 43, no. 2 (2019): 236-256.
4318_cyber_in_critical_infrastructure_organizations.pdf — Downloaded 4260 times
"
Comparative Research of Cybersecurity Information Sharing Models
Comparative Research of Cybersecurity Information Sharing Models." Information & Security: An International Journal 43, no. 2 (2019): 175-195.
4315_cybersecurity_information_sharing_models.pdf — Downloaded 4108 times
"
Utilising Experiential and Organizational Learning Theories to Improve Human Performance in Cyber Training
Utilising Experiential and Organizational Learning Theories to Improve Human Performance in Cyber Training." Information & Security: An International Journal 43, no. 2 (2019): 123-133.
4311_cyber_training.pdf — Downloaded 4536 times
"
Cooperation Model for Establishing Secure Digital Transformation in Corporations: Overview of Regulatory Issues
Cooperation Model for Establishing Secure Digital Transformation in Corporations: Overview of Regulatory Issues." Information & Security: An International Journal 43, no. 1 (2019): 98-112.
4309_cooperation_regulatory_issues.pdf — Downloaded 3404 times
"
Quantum-Based Solutions for the Next-Generation Internet
Quantum-Based Solutions for the Next-Generation Internet." Information & Security: An International Journal 43, no. 1 (2019): 62-72.
4306_quantum-based_internet.pdf — Downloaded 4212 times
"
Cryptographic Key Generation by Genetic Algorithms
Cryptographic Key Generation by Genetic Algorithms." Information & Security: An International Journal 43, no. 1 (2019): 54-61.
4305_genetic_algorithms_crypto.pdf — Downloaded 4076 times
"
Generalized Net Model of Possible Drone’s Communication Control Cyber Theft with Intuitionistic Fuzzy Estimations
Generalized Net Model of Possible Drone’s Communication Control Cyber Theft with Intuitionistic Fuzzy Estimations." Information & Security: An International Journal 43, no. 1 (2019): 35-44.
4303_cyberattack_drones.pdf — Downloaded 4156 times
"