Cybersecurity
A Hybrid Intrusion Detection with Decision Tree for Feature Selection
A Hybrid Intrusion Detection with Decision Tree for Feature Selection In Information & Security: An International Journal. Vol. 49., 2021.
4901_a_hybrid_id_with_decision_tree_for_fs_preview.pdf — Downloaded 2358 times
A Model of a Cyber Defence Awareness System of Campaigns with Malicious Information
A Model of a Cyber Defence Awareness System of Campaigns with Malicious Information." Information & Security: An International Journal 46, no. 2 (2020): 182-197.
" 4613_cyber_defence_awareness.pdf — Downloaded 2749 times
Cryptographic Key Generation by Genetic Algorithms
Cryptographic Key Generation by Genetic Algorithms." Information & Security: An International Journal 43, no. 1 (2019): 54-61.
" 4305_genetic_algorithms_crypto.pdf — Downloaded 3422 times
Generalized Net Model of Possible Drone’s Communication Control Cyber Theft with Intuitionistic Fuzzy Estimations
Generalized Net Model of Possible Drone’s Communication Control Cyber Theft with Intuitionistic Fuzzy Estimations." Information & Security: An International Journal 43, no. 1 (2019): 35-44.
" 4303_cyberattack_drones.pdf — Downloaded 3545 times
From Cryptology to Cyber Resilience – Bridging Theory and Practice
From Cryptology to Cyber Resilience – Bridging Theory and Practice." Information & Security: An International Journal 37 (2017): 5-7.
" 3700_cryptology_cyber_resilience.pdf — Downloaded 473 times
Cybersecurity: A Generic Reference Curriculum
Cybersecurity: A Generic Reference Curriculum. Kingston, ON: National Defence, 2016.
Cybersecurity Innovation in NATO: Lessons Learned and Recommendations
Cybersecurity Innovation in NATO: Lessons Learned and Recommendations." Information & Security: An International Journal 36 (2017).
" Cybersecurity Innovation in NATO — Downloaded 6504 times
Challenges to Human Factor for Advance Persistent Threats Proactive Identification in Modern Social Networks
Challenges to Human Factor for Advance Persistent Threats Proactive Identification in Modern Social Networks." Information & Security: An International Journal 34, no. 2 (2016): 123-136.
" 3405_minchev_id_ipts_in_social_networks.pdf — Downloaded 2375 times