Cybersecurity
Self-Advertising Attack Surfaces for Web Application Honeypots: New Technology to Managing Cyber Disasters
Self-Advertising Attack Surfaces for Web Application Honeypots: New Technology to Managing Cyber Disasters." Information & Security: An International Journal 40, no. 2 (2018): 189-202.
4014_self-advertising_honeypots.pdf — Downloaded 3172 times
"
Information Sharing for Cyber Threats
Information Sharing for Cyber Threats." Information & Security: An International Journal 39, no. 1 (2018): 43-50.
3904_rizov_information_sharing.pdf — Downloaded 6264 times
"
From Cryptology to Cyber Resilience – Bridging Theory and Practice
From Cryptology to Cyber Resilience – Bridging Theory and Practice." Information & Security: An International Journal 37 (2017): 5-7.
3700_cryptology_cyber_resilience.pdf — Downloaded 704 times
"
Cyber Security and Resilience of Modern Societies: A Research Management Architecture
Cyber Security and Resilience of Modern Societies: A Research Management Architecture." Information & Security: An International Journal 38 (2017): 93-108.
3807_Cybersecurity Research Management Architecture — Downloaded 6937 times
"
Hybrid War: High-tech, Information and Cyber Conflicts
Hybrid War: High-tech, Information and Cyber Conflicts." Connections: The Quarterly Journal 16, no. 2 (2017): 5-24.
Danyk, Hybrid war — Downloaded 7461 times
"
A Generic Reference Curriculum on Cybersecurity
A Generic Reference Curriculum on Cybersecurity." Information & Security: An International Journal 35, no. 2 (2016): 181-184.
Cybersecurity Reference Curriculum — Downloaded 4913 times
"
A Comprehensive Approach to Cyber Security –Trends, Challenges and the Way Forward
A Comprehensive Approach to Cyber Security –Trends, Challenges and the Way Forward." In The Dangerous Landscape, 47-61., 2013.
A Comprehensive Approach to Cyber Security — Downloaded 4763 times
"
Cyberspace as the Environment Affected by Organized Crime Activity
Cyberspace as the Environment Affected by Organized Crime Activity." Connections: The Quarterly Journal 15, no. 3 (2016): 55-64.
Cyberspace Affected by Organized Crime — Downloaded 5794 times
"

The Obama Administration and Incident Response: A Report
The Obama Administration and Incident Response: A Report." Information & Security: An International Journal 34, no. 2 (2016): 105-120.
3408_collier_us_incident_response.pdf — Downloaded 3887 times
"
Multi-stakeholder Approach to Cybersecurity and Resilience
Multi-stakeholder Approach to Cybersecurity and Resilience." Information & Security: An International Journal 34, no. 1 (2016): 59-68.
3405_multi-stakeholder_cybersecurity.pdf — Downloaded 2259 times
"