Information security
Launching Narrative into the Information Battlefield
Launching Narrative into the Information Battlefield." Connections: The Quarterly Journal 21, no. 2 (2022): 111-122.
21.2.08_launching_narrative_f.pdf — Downloaded 857 times
"Introduction

A Hybrid Intrusion Detection with Decision Tree for Feature Selection
A Hybrid Intrusion Detection with Decision Tree for Feature Selection In Information & Security: An International Journal. Vol. 49., 2021.
4901_a_hybrid_id_with_decision_tree_for_fs_preview.pdf — Downloaded 2862 times

Design of Technical Methods for Analysing Network Security Based on Identification of Network Traffic Anomalies
Design of Technical Methods for Analysing Network Security Based on Identification of Network Traffic Anomalies." Information & Security: An International Journal 47, no. 3 (2020): 306-316.
4722_identification_network_traffic_anomalies.pdf — Downloaded 2985 times
"
Using the Cyber Situational Awareness Concept for Protection of Agricultural Enterprise Management Information Systems
Using the Cyber Situational Awareness Concept for Protection of Agricultural Enterprise Management Information Systems." Information & Security: An International Journal 46, no. 2 (2020): 168-181.
4612_sa_agricultural.pdf — Downloaded 3074 times
"
MonSys: A Scalable Platform for Monitoring Digital Services Availability, Threat Intelligence and Cyber Resilience Situational Awareness
MonSys: A Scalable Platform for Monitoring Digital Services Availability, Threat Intelligence and Cyber Resilience Situational Awareness." Information & Security: An International Journal 46, no. 2 (2020): 155-167.
4611_monsys.pdf — Downloaded 3367 times
"
Security Analysis of Diceware Passphrases
Security Analysis of Diceware Passphrases." Information & Security: An International Journal 47, no. 2 (2020): 276-282.
4719_diceware_passphrases.pdf — Downloaded 4995 times
"
A New Steganographic Algorithm for Hiding Messages in Music
A New Steganographic Algorithm for Hiding Messages in Music." Information & Security: An International Journal 47, no. 2 (2020): 261-275.
4718_hiding_messages_in_music.pdf — Downloaded 4037 times
"
One-way Function Based on Modified Cellular Automata in the Diffie-Hellman Algorithm for Big Data Exchange Tasks through Open Space
One-way Function Based on Modified Cellular Automata in the Diffie-Hellman Algorithm for Big Data Exchange Tasks through Open Space." Information & Security: An International Journal 47, no. 2 (2020): 233-246.
4716_diffie-hellman_big_data.pdf — Downloaded 3288 times
"
Adopting Machine Learning for Images Transferred with LoRaWAN
Adopting Machine Learning for Images Transferred with LoRaWAN." Information & Security: An International Journal 47, no. 2 (2020): 172-186.
4712_adopting_machine_learning_for_images.pdf — Downloaded 3199 times
"
Neglected Cybersecurity Risks in the Public Internet Hosting Service Providers
Neglected Cybersecurity Risks in the Public Internet Hosting Service Providers." Information & Security: An International Journal 47, no. 1 (2020): 62-76.
4704_cybersec_risks_hosting_providers.pdf — Downloaded 2962 times
"