Information security
A Hybrid Intrusion Detection with Decision Tree for Feature Selection
A Hybrid Intrusion Detection with Decision Tree for Feature Selection In Information & Security: An International Journal. Vol. 49., 2021.
4901_a_hybrid_id_with_decision_tree_for_fs_preview.pdf — Downloaded 714 times

Design of Technical Methods for Analysing Network Security Based on Identification of Network Traffic Anomalies
Design of Technical Methods for Analysing Network Security Based on Identification of Network Traffic Anomalies." Information & Security: An International Journal 47, no. 3 (2020): 306-316.
4722_identification_network_traffic_anomalies.pdf — Downloaded 1214 times
"
Using the Cyber Situational Awareness Concept for Protection of Agricultural Enterprise Management Information Systems
Using the Cyber Situational Awareness Concept for Protection of Agricultural Enterprise Management Information Systems." Information & Security: An International Journal 46, no. 2 (2020): 168-181.
4612_sa_agricultural.pdf — Downloaded 1151 times
"
MonSys: A Scalable Platform for Monitoring Digital Services Availability, Threat Intelligence and Cyber Resilience Situational Awareness
MonSys: A Scalable Platform for Monitoring Digital Services Availability, Threat Intelligence and Cyber Resilience Situational Awareness." Information & Security: An International Journal 46, no. 2 (2020): 155-167.
4611_monsys.pdf — Downloaded 1352 times
"
Security Analysis of Diceware Passphrases
Security Analysis of Diceware Passphrases." Information & Security: An International Journal 47, no. 2 (2020): 276-282.
4719_diceware_passphrases.pdf — Downloaded 1845 times
"
A New Steganographic Algorithm for Hiding Messages in Music
A New Steganographic Algorithm for Hiding Messages in Music." Information & Security: An International Journal 47, no. 2 (2020): 261-275.
4718_hiding_messages_in_music.pdf — Downloaded 1647 times
"
One-way Function Based on Modified Cellular Automata in the Diffie-Hellman Algorithm for Big Data Exchange Tasks through Open Space
One-way Function Based on Modified Cellular Automata in the Diffie-Hellman Algorithm for Big Data Exchange Tasks through Open Space." Information & Security: An International Journal 47, no. 2 (2020): 233-246.
4716_diffie-hellman_big_data.pdf — Downloaded 1153 times
"
Adopting Machine Learning for Images Transferred with LoRaWAN
Adopting Machine Learning for Images Transferred with LoRaWAN." Information & Security: An International Journal 47, no. 2 (2020): 172-186.
4712_adopting_machine_learning_for_images.pdf — Downloaded 1185 times
"
Neglected Cybersecurity Risks in the Public Internet Hosting Service Providers
Neglected Cybersecurity Risks in the Public Internet Hosting Service Providers." Information & Security: An International Journal 47, no. 1 (2020): 62-76.
4704_cybersec_risks_hosting_providers.pdf — Downloaded 1172 times
"
A System for Analysis of Big Data from Social Media
A System for Analysis of Big Data from Social Media." Information & Security: An International Journal 47, no. 1 (2020): 44-61.
4703_big_data_social_media.pdf — Downloaded 1406 times
"