Cyber threats
Beyond Punishment: Deterrence in the Digital Realm
Beyond Punishment: Deterrence in the Digital Realm." Connections: The Quarterly Journal 18, no. 1 (2019): 61-68.
18.1.04_deterrence_cyber.pdf — Downloaded 1318 times
"he Comfortable Laziness of Deterrence Theory
Can anything new and meaningful be said of deterrence? Not necessarily starting from Hermocrates of Syracuse, any analysis of deterrence has at least to notice that deterrence, narrowly understood, refers to a threat of punishment.[1] At the same, it should be noted that a wider reading acknowledges two aspects of deterrence: punishment and denial.
![application/pdf](/modules/file/icons/application-pdf.png)
Russia’s Digital Awakening
Russia’s Digital Awakening." Connections: The Quarterly Journal 17, no. 2 (2018): 5-17.
17.2.01_chim_russia_digital_awakening.pdf — Downloaded 3752 times
"
![application/pdf](/modules/file/icons/application-pdf.png)
Graphic Model of The Target Audience of Psychological Influence in Social Networks
Graphic Model of The Target Audience of Psychological Influence in Social Networks." Information & Security: An International Journal 41 (2018): 81-93.
4106_savchuk.pdf — Downloaded 3717 times
"![application/pdf](/modules/file/icons/application-pdf.png)
Methodological Foundation of State’s Information Security in Social Networking Services in Conditions of Hybrid War
Methodological Foundation of State’s Information Security in Social Networking Services in Conditions of Hybrid War." Information & Security: An International Journal 41 (2018): 61-79.
4105_hryshchuk_molodetska.pdf — Downloaded 1990 times
"![application/pdf](/modules/file/icons/application-pdf.png)
Information Sharing for Cyber Threats
Information Sharing for Cyber Threats." Information & Security: An International Journal 39, no. 1 (2018): 43-50.
3904_rizov_information_sharing.pdf — Downloaded 6175 times
"![application/pdf](/modules/file/icons/application-pdf.png)
A Software Tool ASR for a posteriori Cryptanalysis on Public Keys Generated with ‘RSA’
A Software Tool ASR for a posteriori Cryptanalysis on Public Keys Generated with ‘RSA’." Information & Security: An International Journal 37 (2017): 29-34.
3702_software_tool_asr.pdf — Downloaded 836 times
"![application/pdf](/modules/file/icons/application-pdf.png)
From Cryptology to Cyber Resilience – Bridging Theory and Practice
From Cryptology to Cyber Resilience – Bridging Theory and Practice." Information & Security: An International Journal 37 (2017): 5-7.
3700_cryptology_cyber_resilience.pdf — Downloaded 662 times
"![application/pdf](/modules/file/icons/application-pdf.png)
Hybrid War: High-tech, Information and Cyber Conflicts
Hybrid War: High-tech, Information and Cyber Conflicts." Connections: The Quarterly Journal 16, no. 2 (2017): 5-24.
Danyk, Hybrid war — Downloaded 7364 times
"![application/pdf](/modules/file/icons/application-pdf.png)
Cybersecurity: A Generic Reference Curriculum
Cybersecurity: A Generic Reference Curriculum. Kingston, ON: National Defence, 2016.
A Comprehensive Approach to Cyber Security –Trends, Challenges and the Way Forward
A Comprehensive Approach to Cyber Security –Trends, Challenges and the Way Forward." In The Dangerous Landscape, 47-61., 2013.
A Comprehensive Approach to Cyber Security — Downloaded 4686 times
"![application/pdf](/modules/file/icons/application-pdf.png)