Skip to main content
Procon Ltd. Information & Security: An International Journal
About
Business areas
Business Process
Business Intelligence
Knowledge Dissemination
Studies
Publishing
Partners
News
Books & Papers
Books
Authors
Keywords
You are here
Home
»
Cybersecurity
Cybersecurity
Signature-based Intrusion Detection Hardware-Software Complex
Stetsenko, Inna V.
, and
Maksym Demydenko
.
"
Signature-based Intrusion Detection Hardware-Software Complex
."
Information & Security: An International Journal
47, no. 2 (2020): 221-231.
4715_signature-based_ids.pdf
— Downloaded 4036 times
Read more
about Signature-based Intrusion Detection Hardware-Software Complex
7615 reads
Google Scholar
DOI
RTF
EndNote XML
Cyber Threat Prediction with Machine Learning
Kok, Arvid
,
Ivana Ilic Mestric
,
Giavid Valiyev
, and
Michael Street
.
"
Cyber Threat Prediction with Machine Learning
."
Information & Security: An International Journal
47, no. 2 (2020): 203-220.
4714_cyber_threat_assessment.pdf
— Downloaded 4264 times
Read more
about Cyber Threat Prediction with Machine Learning
10432 reads
Google Scholar
DOI
RTF
EndNote XML
Information Technology for Big Data Sensor Networks Stability Estimation
Petrivskyi, Volodymyr
,
Georgi Dimitrov
,
Viktor Shevchenko
,
Oleksiy Bychkov
,
Magdalena Garvanova
,
Galina Panayotova
, and
Pavel Petrov
.
"
Information Technology for Big Data Sensor Networks Stability Estimation
."
Information & Security: An International Journal
47, no. 1 (2020): 141-154.
4710_big_data_sensor_networks_stability_estimation.pdf
— Downloaded 3023 times
Read more
about Information Technology for Big Data Sensor Networks Stability Estimation
6572 reads
Google Scholar
DOI
RTF
EndNote XML
Tactical Approach to Cyber Defence in IoT Computer Networks
Staneva, Elisaveta
, and
Mariyan Rachev
.
"
Tactical Approach to Cyber Defence in IoT Computer Networks
."
Information & Security: An International Journal
47, no. 1 (2020): 135-140.
4709_tactical_cyber_defense_iot.pdf
— Downloaded 2674 times
Read more
about Tactical Approach to Cyber Defence in IoT Computer Networks
6615 reads
Google Scholar
DOI
RTF
EndNote XML
A Cost-Effective Approach to Securing Systems through Partial Decentralization
Savchenko, Nikita
,
Vitaliy Tsyganok
, and
Oleh Andriichuk
.
"
A Cost-Effective Approach to Securing Systems through Partial Decentralization
."
Information & Security: An International Journal
47, no. 1 (2020): 109-121.
4707_decentralization.pdf
— Downloaded 3082 times
Read more
about A Cost-Effective Approach to Securing Systems through Partial Decentralization
8006 reads
Google Scholar
DOI
RTF
EndNote XML
Resilience Management Framework for Critical Information Infrastructure: Designing the Level of Trust that Encourages the Exchange of Health Data
Rajamäki, Jyri
.
"
Resilience Management Framework for Critical Information Infrastructure: Designing the Level of Trust that Encourages the Exchange of Health Data
."
Information & Security: An International Journal
47, no. 1 (2020): 91-108.
4706_trust_health_data_exchange.pdf
— Downloaded 3368 times
Read more
about Resilience Management Framework for Critical Information Infrastructure: Designing the Level of Trust that Encourages the Exchange of Health Data
10979 reads
Google Scholar
DOI
RTF
EndNote XML
Cybernetic Approach to Developing Resilient Systems: Concept, Models and Application
Kharchenko, Vyacheslav
,
Sergiy Dotsenko
,
Yuriy Ponochovnyi
, and
Oleg Illiashenko
.
"
Cybernetic Approach to Developing Resilient Systems: Concept, Models and Application
."
Information & Security: An International Journal
47, no. 1 (2020): 77-90.
4705_cybernetic_approach_resilient_systems.pdf
— Downloaded 3155 times
Read more
about Cybernetic Approach to Developing Resilient Systems: Concept, Models and Application
9906 reads
Google Scholar
DOI
RTF
EndNote XML
Neglected Cybersecurity Risks in the Public Internet Hosting Service Providers
Blagoev, Ivan
.
"
Neglected Cybersecurity Risks in the Public Internet Hosting Service Providers
."
Information & Security: An International Journal
47, no. 1 (2020): 62-76.
4704_cybersec_risks_hosting_providers.pdf
— Downloaded 2893 times
Read more
about Neglected Cybersecurity Risks in the Public Internet Hosting Service Providers
7536 reads
Google Scholar
DOI
RTF
EndNote XML
Analysis of Cybersecurity Issues in the Maritime Industry
Mednikarov, Boyan
,
Yuliyan Tsonev
, and
Andon Lazarov
.
"
Analysis of Cybersecurity Issues in the Maritime Industry
."
Information & Security: An International Journal
47, no. 1 (2020): 27-43.
4702_maritime_industry_cyber_security.pdf
— Downloaded 5466 times
Read more
about Analysis of Cybersecurity Issues in the Maritime Industry
11517 reads
Google Scholar
DOI
RTF
EndNote XML
A Logical Model for Multi-Sector Cyber Risk Management
Tagarev, Todor
,
Salvatore Marco Pappalardo
, and
Nikolai Stoianov
.
"
A Logical Model for Multi-Sector Cyber Risk Management
."
Information & Security: An International Journal
47, no. 1 (2020): 13-26.
4701_risk_assessment_for_emaf.pdf
— Downloaded 3995 times
Read more
about A Logical Model for Multi-Sector Cyber Risk Management
15211 reads
Google Scholar
DOI
RTF
EndNote XML
Pages
« first
‹ previous
1
2
3
4
5
6
7
8
9
next ›
last »
Search form
Search
Information & Security journal
I&S Volumes
Policy
Editorial Board
Active Calls
Copyright & Licensing
Indexing & Archiving
Submit a paper
Books & Papers
Top downloads
Previews
On Inequalities Bounding Imprecision and Nonspecificity Measures of Uncertainty
On the Effectiveness of Measures of Uncertainty of Basic Belief Assignments
Blockchain in Agriculture
Multi-UAV Mission Planning for Monitoring Critical Infrastructures Considering Failures and Cyberattacks
A Hybrid Intrusion Detection with Decision Tree for Feature Selection
European Conflict Analysis Project (ECAP)
Generalized Net Model of the Water Resources Assessment Process and Water Use Management
view all
News
14/08/2020
Nanotechnology and Global Security
14/08/2020
Nanotechnology and Global Security
13/08/2020
How Improved Attribution in Cyber Warfare Can Help De-Escalate Cyber Arms Race
13/08/2020
Hybrid War: High-tech, Information and Cyber Conflicts
13/08/2020
The Age of Post-Truth: State Influence and Strategic Communication - Contemporary Security Challenges on Europe’s Eastern Flank:
11/08/2020
How Improved Attribution in Cyber Warfare Can Help De-Escalate Cyber Arms Race
10/08/2020
Social Media accounts
10/07/2020
The Winter 2020 issue of Connections
10/10/2018
The Summer-Fall 2018 issue of Connections
10/04/2018
The Winter 2018 issue of Connections
view all