Standards & Technologies
A Cost-Effective Approach to Securing Systems through Partial Decentralization
A Cost-Effective Approach to Securing Systems through Partial Decentralization." Information & Security: An International Journal 47, no. 1 (2020): 109-121.
" 4707_decentralization.pdf — Downloaded 2918 times
Cybernetic Approach to Developing Resilient Systems: Concept, Models and Application
Cybernetic Approach to Developing Resilient Systems: Concept, Models and Application." Information & Security: An International Journal 47, no. 1 (2020): 77-90.
" 4705_cybernetic_approach_resilient_systems.pdf — Downloaded 2993 times
Analysis of Cybersecurity Issues in the Maritime Industry
Analysis of Cybersecurity Issues in the Maritime Industry." Information & Security: An International Journal 47, no. 1 (2020): 27-43.
" 4702_maritime_industry_cyber_security.pdf — Downloaded 5172 times
Implementation of Cloud Technologies for Building Data Centers in Defence and Security
Implementation of Cloud Technologies for Building Data Centers in Defence and Security." Information & Security: An International Journal 43, no. 1 (2019): 89-97.
" 4308_data_cetres_defence_security.pdf — Downloaded 3163 times
Cyber-Physical Systems Security: Research Challenges and Opportunities
Cyber-Physical Systems Security: Research Challenges and Opportunities.", 2019.
" presentation_cyber-physical_systems_security.pdf — Downloaded 1075 times
Amelioration of ElGamal Digital Signature Schemes
Amelioration of ElGamal Digital Signature Schemes." Information & Security: An International Journal 42 (2019): 117-126.
" 4207_amelioration_of_elgamal.pdf — Downloaded 1535 times
Self-Advertising Attack Surfaces for Web Application Honeypots: New Technology to Managing Cyber Disasters
Self-Advertising Attack Surfaces for Web Application Honeypots: New Technology to Managing Cyber Disasters." Information & Security: An International Journal 40, no. 2 (2018): 189-202.
" 4014_self-advertising_honeypots.pdf — Downloaded 2966 times
A Software Tool ASR for a posteriori Cryptanalysis on Public Keys Generated with ‘RSA’
A Software Tool ASR for a posteriori Cryptanalysis on Public Keys Generated with ‘RSA’." Information & Security: An International Journal 37 (2017): 29-34.
" 3702_software_tool_asr.pdf — Downloaded 707 times
Cyber Security and Resilience of Modern Societies: A Research Management Architecture
Cyber Security and Resilience of Modern Societies: A Research Management Architecture." Information & Security: An International Journal 38 (2017): 93-108.
" 3807_Cybersecurity Research Management Architecture — Downloaded 6635 times