Cybersecurity
A Hybrid Intrusion Detection with Decision Tree for Feature Selection
A Hybrid Intrusion Detection with Decision Tree for Feature Selection In Information & Security: An International Journal. Vol. 49., 2021.
4901_a_hybrid_id_with_decision_tree_for_fs_preview.pdf — Downloaded 2561 times
A Model of a Cyber Defence Awareness System of Campaigns with Malicious Information
A Model of a Cyber Defence Awareness System of Campaigns with Malicious Information." Information & Security: An International Journal 46, no. 2 (2020): 182-197.
" 4613_cyber_defence_awareness.pdf — Downloaded 2993 times
Cryptographic Key Generation by Genetic Algorithms
Cryptographic Key Generation by Genetic Algorithms." Information & Security: An International Journal 43, no. 1 (2019): 54-61.
" 4305_genetic_algorithms_crypto.pdf — Downloaded 3658 times
Generalized Net Model of Possible Drone’s Communication Control Cyber Theft with Intuitionistic Fuzzy Estimations
Generalized Net Model of Possible Drone’s Communication Control Cyber Theft with Intuitionistic Fuzzy Estimations." Information & Security: An International Journal 43, no. 1 (2019): 35-44.
" 4303_cyberattack_drones.pdf — Downloaded 3751 times
From Cryptology to Cyber Resilience – Bridging Theory and Practice
From Cryptology to Cyber Resilience – Bridging Theory and Practice." Information & Security: An International Journal 37 (2017): 5-7.
" 3700_cryptology_cyber_resilience.pdf — Downloaded 574 times
Cybersecurity: A Generic Reference Curriculum
Cybersecurity: A Generic Reference Curriculum. Kingston, ON: National Defence, 2016.
Cybersecurity Innovation in NATO: Lessons Learned and Recommendations
Cybersecurity Innovation in NATO: Lessons Learned and Recommendations." Information & Security: An International Journal 36 (2017).
" Cybersecurity Innovation in NATO — Downloaded 6758 times
Challenges to Human Factor for Advance Persistent Threats Proactive Identification in Modern Social Networks
Challenges to Human Factor for Advance Persistent Threats Proactive Identification in Modern Social Networks." Information & Security: An International Journal 34, no. 2 (2016): 123-136.
" 3405_minchev_id_ipts_in_social_networks.pdf — Downloaded 2597 times