Cyber threats
Beyond Punishment: Deterrence in the Digital Realm
Beyond Punishment: Deterrence in the Digital Realm." Connections: The Quarterly Journal 18, no. 1 (2019): 61-68.
"he Comfortable Laziness of Deterrence Theory
Can anything new and meaningful be said of deterrence? Not necessarily starting from Hermocrates of Syracuse, any analysis of deterrence has at least to notice that deterrence, narrowly understood, refers to a threat of punishment.[1] At the same, it should be noted that a wider reading acknowledges two aspects of deterrence: punishment and denial.
18.1.04_deterrence_cyber.pdf — Downloaded 1307 times
Russia’s Digital Awakening
Russia’s Digital Awakening." Connections: The Quarterly Journal 17, no. 2 (2018): 5-17.
"
17.2.01_chim_russia_digital_awakening.pdf — Downloaded 3738 times
Graphic Model of The Target Audience of Psychological Influence in Social Networks
Graphic Model of The Target Audience of Psychological Influence in Social Networks." Information & Security: An International Journal 41 (2018): 81-93.
" 4106_savchuk.pdf — Downloaded 3710 times
Methodological Foundation of State’s Information Security in Social Networking Services in Conditions of Hybrid War
Methodological Foundation of State’s Information Security in Social Networking Services in Conditions of Hybrid War." Information & Security: An International Journal 41 (2018): 61-79.
" 4105_hryshchuk_molodetska.pdf — Downloaded 1987 times
Information Sharing for Cyber Threats
Information Sharing for Cyber Threats." Information & Security: An International Journal 39, no. 1 (2018): 43-50.
" 3904_rizov_information_sharing.pdf — Downloaded 6153 times
A Software Tool ASR for a posteriori Cryptanalysis on Public Keys Generated with ‘RSA’
A Software Tool ASR for a posteriori Cryptanalysis on Public Keys Generated with ‘RSA’." Information & Security: An International Journal 37 (2017): 29-34.
" 3702_software_tool_asr.pdf — Downloaded 821 times
From Cryptology to Cyber Resilience – Bridging Theory and Practice
From Cryptology to Cyber Resilience – Bridging Theory and Practice." Information & Security: An International Journal 37 (2017): 5-7.
" 3700_cryptology_cyber_resilience.pdf — Downloaded 656 times
Hybrid War: High-tech, Information and Cyber Conflicts
Hybrid War: High-tech, Information and Cyber Conflicts." Connections: The Quarterly Journal 16, no. 2 (2017): 5-24.
" Danyk, Hybrid war — Downloaded 7347 times
Cybersecurity: A Generic Reference Curriculum
Cybersecurity: A Generic Reference Curriculum. Kingston, ON: National Defence, 2016.
A Comprehensive Approach to Cyber Security –Trends, Challenges and the Way Forward
A Comprehensive Approach to Cyber Security –Trends, Challenges and the Way Forward." In The Dangerous Landscape, 47-61., 2013.
" A Comprehensive Approach to Cyber Security — Downloaded 4665 times