Information security
Launching Narrative into the Information Battlefield
Launching Narrative into the Information Battlefield." Connections: The Quarterly Journal 21, no. 2 (2022): 111-122.
21.2.08_launching_narrative_f.pdf — Downloaded 5 times
"
A Hybrid Intrusion Detection with Decision Tree for Feature Selection
A Hybrid Intrusion Detection with Decision Tree for Feature Selection In Information & Security: An International Journal. Vol. 49., 2021.
4901_a_hybrid_id_with_decision_tree_for_fs_preview.pdf — Downloaded 1725 times

Design of Technical Methods for Analysing Network Security Based on Identification of Network Traffic Anomalies
Design of Technical Methods for Analysing Network Security Based on Identification of Network Traffic Anomalies." Information & Security: An International Journal 47, no. 3 (2020): 306-316.
4722_identification_network_traffic_anomalies.pdf — Downloaded 2090 times
"
Using the Cyber Situational Awareness Concept for Protection of Agricultural Enterprise Management Information Systems
Using the Cyber Situational Awareness Concept for Protection of Agricultural Enterprise Management Information Systems." Information & Security: An International Journal 46, no. 2 (2020): 168-181.
4612_sa_agricultural.pdf — Downloaded 2033 times
"
MonSys: A Scalable Platform for Monitoring Digital Services Availability, Threat Intelligence and Cyber Resilience Situational Awareness
MonSys: A Scalable Platform for Monitoring Digital Services Availability, Threat Intelligence and Cyber Resilience Situational Awareness." Information & Security: An International Journal 46, no. 2 (2020): 155-167.
4611_monsys.pdf — Downloaded 2223 times
"
Security Analysis of Diceware Passphrases
Security Analysis of Diceware Passphrases." Information & Security: An International Journal 47, no. 2 (2020): 276-282.
4719_diceware_passphrases.pdf — Downloaded 3777 times
"
A New Steganographic Algorithm for Hiding Messages in Music
A New Steganographic Algorithm for Hiding Messages in Music." Information & Security: An International Journal 47, no. 2 (2020): 261-275.
4718_hiding_messages_in_music.pdf — Downloaded 2776 times
"
One-way Function Based on Modified Cellular Automata in the Diffie-Hellman Algorithm for Big Data Exchange Tasks through Open Space
One-way Function Based on Modified Cellular Automata in the Diffie-Hellman Algorithm for Big Data Exchange Tasks through Open Space." Information & Security: An International Journal 47, no. 2 (2020): 233-246.
4716_diffie-hellman_big_data.pdf — Downloaded 2163 times
"
Adopting Machine Learning for Images Transferred with LoRaWAN
Adopting Machine Learning for Images Transferred with LoRaWAN." Information & Security: An International Journal 47, no. 2 (2020): 172-186.
4712_adopting_machine_learning_for_images.pdf — Downloaded 2104 times
"
Neglected Cybersecurity Risks in the Public Internet Hosting Service Providers
Neglected Cybersecurity Risks in the Public Internet Hosting Service Providers." Information & Security: An International Journal 47, no. 1 (2020): 62-76.
4704_cybersec_risks_hosting_providers.pdf — Downloaded 2001 times
"