Standards & Technologies
A Cost-Effective Approach to Securing Systems through Partial Decentralization
A Cost-Effective Approach to Securing Systems through Partial Decentralization." Information & Security: An International Journal 47, no. 1 (2020): 109-121.
4707_decentralization.pdf — Downloaded 3186 times
"
Cybernetic Approach to Developing Resilient Systems: Concept, Models and Application
Cybernetic Approach to Developing Resilient Systems: Concept, Models and Application." Information & Security: An International Journal 47, no. 1 (2020): 77-90.
4705_cybernetic_approach_resilient_systems.pdf — Downloaded 3277 times
"
Analysis of Cybersecurity Issues in the Maritime Industry
Analysis of Cybersecurity Issues in the Maritime Industry." Information & Security: An International Journal 47, no. 1 (2020): 27-43.
4702_maritime_industry_cyber_security.pdf — Downloaded 5746 times
"
Implementation of Cloud Technologies for Building Data Centers in Defence and Security
Implementation of Cloud Technologies for Building Data Centers in Defence and Security." Information & Security: An International Journal 43, no. 1 (2019): 89-97.
4308_data_cetres_defence_security.pdf — Downloaded 3392 times
"
Cyber-Physical Systems Security: Research Challenges and Opportunities
Cyber-Physical Systems Security: Research Challenges and Opportunities.", 2019.
presentation_cyber-physical_systems_security.pdf — Downloaded 1228 times
"
Amelioration of ElGamal Digital Signature Schemes
Amelioration of ElGamal Digital Signature Schemes." Information & Security: An International Journal 42 (2019): 117-126.
4207_amelioration_of_elgamal.pdf — Downloaded 1732 times
"
Self-Advertising Attack Surfaces for Web Application Honeypots: New Technology to Managing Cyber Disasters
Self-Advertising Attack Surfaces for Web Application Honeypots: New Technology to Managing Cyber Disasters." Information & Security: An International Journal 40, no. 2 (2018): 189-202.
4014_self-advertising_honeypots.pdf — Downloaded 3232 times
"
A Software Tool ASR for a posteriori Cryptanalysis on Public Keys Generated with ‘RSA’
A Software Tool ASR for a posteriori Cryptanalysis on Public Keys Generated with ‘RSA’." Information & Security: An International Journal 37 (2017): 29-34.
3702_software_tool_asr.pdf — Downloaded 954 times
"
Cyber Security and Resilience of Modern Societies: A Research Management Architecture
Cyber Security and Resilience of Modern Societies: A Research Management Architecture." Information & Security: An International Journal 38 (2017): 93-108.
3807_Cybersecurity Research Management Architecture — Downloaded 7033 times
"