Cybersecurity
A Hybrid Intrusion Detection with Decision Tree for Feature Selection
A Hybrid Intrusion Detection with Decision Tree for Feature Selection In Information & Security: An International Journal. Vol. 49., 2021.
4901_a_hybrid_id_with_decision_tree_for_fs_preview.pdf — Downloaded 2576 times
A Model of a Cyber Defence Awareness System of Campaigns with Malicious Information
A Model of a Cyber Defence Awareness System of Campaigns with Malicious Information." Information & Security: An International Journal 46, no. 2 (2020): 182-197.
" 4613_cyber_defence_awareness.pdf — Downloaded 3005 times
Cryptographic Key Generation by Genetic Algorithms
Cryptographic Key Generation by Genetic Algorithms." Information & Security: An International Journal 43, no. 1 (2019): 54-61.
" 4305_genetic_algorithms_crypto.pdf — Downloaded 3674 times
Generalized Net Model of Possible Drone’s Communication Control Cyber Theft with Intuitionistic Fuzzy Estimations
Generalized Net Model of Possible Drone’s Communication Control Cyber Theft with Intuitionistic Fuzzy Estimations." Information & Security: An International Journal 43, no. 1 (2019): 35-44.
" 4303_cyberattack_drones.pdf — Downloaded 3770 times
From Cryptology to Cyber Resilience – Bridging Theory and Practice
From Cryptology to Cyber Resilience – Bridging Theory and Practice." Information & Security: An International Journal 37 (2017): 5-7.
" 3700_cryptology_cyber_resilience.pdf — Downloaded 583 times
Cybersecurity: A Generic Reference Curriculum
Cybersecurity: A Generic Reference Curriculum. Kingston, ON: National Defence, 2016.
Cybersecurity Innovation in NATO: Lessons Learned and Recommendations
Cybersecurity Innovation in NATO: Lessons Learned and Recommendations." Information & Security: An International Journal 36 (2017).
" Cybersecurity Innovation in NATO — Downloaded 6771 times
Challenges to Human Factor for Advance Persistent Threats Proactive Identification in Modern Social Networks
Challenges to Human Factor for Advance Persistent Threats Proactive Identification in Modern Social Networks." Information & Security: An International Journal 34, no. 2 (2016): 123-136.
" 3405_minchev_id_ipts_in_social_networks.pdf — Downloaded 2615 times