Information security
Launching Narrative into the Information Battlefield
Launching Narrative into the Information Battlefield." Connections: The Quarterly Journal 21, no. 2 (2022): 111-122.
21.2.08_launching_narrative_f.pdf — Downloaded 812 times
"Introduction
![application/pdf](/modules/file/icons/application-pdf.png)
A Hybrid Intrusion Detection with Decision Tree for Feature Selection
A Hybrid Intrusion Detection with Decision Tree for Feature Selection In Information & Security: An International Journal. Vol. 49., 2021.
4901_a_hybrid_id_with_decision_tree_for_fs_preview.pdf — Downloaded 2795 times
![application/pdf](/modules/file/icons/application-pdf.png)
Design of Technical Methods for Analysing Network Security Based on Identification of Network Traffic Anomalies
Design of Technical Methods for Analysing Network Security Based on Identification of Network Traffic Anomalies." Information & Security: An International Journal 47, no. 3 (2020): 306-316.
4722_identification_network_traffic_anomalies.pdf — Downloaded 2936 times
"![application/pdf](/modules/file/icons/application-pdf.png)
Using the Cyber Situational Awareness Concept for Protection of Agricultural Enterprise Management Information Systems
Using the Cyber Situational Awareness Concept for Protection of Agricultural Enterprise Management Information Systems." Information & Security: An International Journal 46, no. 2 (2020): 168-181.
4612_sa_agricultural.pdf — Downloaded 3030 times
"![application/pdf](/modules/file/icons/application-pdf.png)
MonSys: A Scalable Platform for Monitoring Digital Services Availability, Threat Intelligence and Cyber Resilience Situational Awareness
MonSys: A Scalable Platform for Monitoring Digital Services Availability, Threat Intelligence and Cyber Resilience Situational Awareness." Information & Security: An International Journal 46, no. 2 (2020): 155-167.
4611_monsys.pdf — Downloaded 3313 times
"![application/pdf](/modules/file/icons/application-pdf.png)
Security Analysis of Diceware Passphrases
Security Analysis of Diceware Passphrases." Information & Security: An International Journal 47, no. 2 (2020): 276-282.
4719_diceware_passphrases.pdf — Downloaded 4938 times
"![application/pdf](/modules/file/icons/application-pdf.png)
A New Steganographic Algorithm for Hiding Messages in Music
A New Steganographic Algorithm for Hiding Messages in Music." Information & Security: An International Journal 47, no. 2 (2020): 261-275.
4718_hiding_messages_in_music.pdf — Downloaded 3972 times
"![application/pdf](/modules/file/icons/application-pdf.png)
One-way Function Based on Modified Cellular Automata in the Diffie-Hellman Algorithm for Big Data Exchange Tasks through Open Space
One-way Function Based on Modified Cellular Automata in the Diffie-Hellman Algorithm for Big Data Exchange Tasks through Open Space." Information & Security: An International Journal 47, no. 2 (2020): 233-246.
4716_diffie-hellman_big_data.pdf — Downloaded 3237 times
"![application/pdf](/modules/file/icons/application-pdf.png)
Adopting Machine Learning for Images Transferred with LoRaWAN
Adopting Machine Learning for Images Transferred with LoRaWAN." Information & Security: An International Journal 47, no. 2 (2020): 172-186.
4712_adopting_machine_learning_for_images.pdf — Downloaded 3143 times
"![application/pdf](/modules/file/icons/application-pdf.png)
Neglected Cybersecurity Risks in the Public Internet Hosting Service Providers
Neglected Cybersecurity Risks in the Public Internet Hosting Service Providers." Information & Security: An International Journal 47, no. 1 (2020): 62-76.
4704_cybersec_risks_hosting_providers.pdf — Downloaded 2907 times
"![application/pdf](/modules/file/icons/application-pdf.png)