Skip to main content
Procon Ltd. Information & Security: An International Journal
About
Business areas
Business Process
Business Intelligence
Knowledge Dissemination
Studies
Publishing
Partners
News
Books & Papers
Books
Authors
Keywords
You are here
Home
»
Cybersecurity
Cybersecurity
Diffusion of Information in an Online Social Network with Limited Attention
Oliveira, Diego F. M.
, and
Kevin S. Chan
.
"
Diffusion of Information in an Online Social Network with Limited Attention
."
Information & Security: An International Journal
43, no. 3 (2019): 362-374.
4327_diffusion_of_information_social_network.pdf
— Downloaded 2992 times
Read more
about Diffusion of Information in an Online Social Network with Limited Attention
9607 reads
Google Scholar
DOI
RTF
EndNote XML
Integrated Model of Knowledge Management for Security of Information Technologies: Standards ISO/IEC 15408 and ISO/IEC 18045
Dotsenko, Sergiy
,
Oleg Illiashenko
,
Sergii Kamenskyi
, and
Vyacheslav Kharchenko
.
"
Integrated Model of Knowledge Management for Security of Information Technologies: Standards ISO/IEC 15408 and ISO/IEC 18045
."
Information & Security: An International Journal
43, no. 3 (2019): 305-317.
4323_knowledge_management_it_security.pdf
— Downloaded 4745 times
Read more
about Integrated Model of Knowledge Management for Security of Information Technologies: Standards ISO/IEC 15408 and ISO/IEC 18045
11962 reads
Google Scholar
DOI
RTF
EndNote XML
An innovative Airport Physical-cyber Security System (APSS)
Matta, Walter
, and
Alessandro Cantelli-Forti
.
"
An innovative Airport Physical-cyber Security System (APSS)
."
Information & Security: An International Journal
43, no. 3 (2019): 285-293.
4321_airport_physical-cyber_security_system.pdf
— Downloaded 3797 times
Read more
about An innovative Airport Physical-cyber Security System (APSS)
10541 reads
Google Scholar
DOI
RTF
EndNote XML
Analysis of the Global Attack Landscape Using Data from a Telnet Honeypot
Bontchev, Vesselin
, and
Veneta Yosifova
.
"
Analysis of the Global Attack Landscape Using Data from a Telnet Honeypot
."
Information & Security: An International Journal
43, no. 2 (2019): 264-282.
4320_global_botnet_attacks_landscape.pdf
— Downloaded 5644 times
Read more
about Analysis of the Global Attack Landscape Using Data from a Telnet Honeypot
14396 reads
Google Scholar
DOI
RTF
EndNote XML
Generalized Net Model of an Automated System for Monitoring, Analysing and Managing Events Related to Information Security
Vardeva, Ivelina
.
"
Generalized Net Model of an Automated System for Monitoring, Analysing and Managing Events Related to Information Security
."
Information & Security: An International Journal
43, no. 2 (2019): 257-263.
4319_gn_model_information_security_management.pdf
— Downloaded 3411 times
Read more
about Generalized Net Model of an Automated System for Monitoring, Analysing and Managing Events Related to Information Security
9479 reads
Google Scholar
DOI
RTF
EndNote XML
Cyber Situational Awareness and Information Sharing in Critical Infrastructure Organizations
Pöyhönen, Jouni
,
Viivi Nuojua
,
Martti Lehto
, and
Jyri Rajamäki
.
"
Cyber Situational Awareness and Information Sharing in Critical Infrastructure Organizations
."
Information & Security: An International Journal
43, no. 2 (2019): 236-256.
4318_cyber_in_critical_infrastructure_organizations.pdf
— Downloaded 4059 times
Read more
about Cyber Situational Awareness and Information Sharing in Critical Infrastructure Organizations
12161 reads
Google Scholar
DOI
RTF
EndNote XML
Comparative Research of Cybersecurity Information Sharing Models
Simola, Jussi
.
"
Comparative Research of Cybersecurity Information Sharing Models
."
Information & Security: An International Journal
43, no. 2 (2019): 175-195.
4315_cybersecurity_information_sharing_models.pdf
— Downloaded 3917 times
Read more
about Comparative Research of Cybersecurity Information Sharing Models
14038 reads
Google Scholar
DOI
RTF
EndNote XML
Utilising Experiential and Organizational Learning Theories to Improve Human Performance in Cyber Training
Aaltola, Kirsi
, and
Petteri Taitto
.
"
Utilising Experiential and Organizational Learning Theories to Improve Human Performance in Cyber Training
."
Information & Security: An International Journal
43, no. 2 (2019): 123-133.
4311_cyber_training.pdf
— Downloaded 4320 times
Read more
about Utilising Experiential and Organizational Learning Theories to Improve Human Performance in Cyber Training
14008 reads
Google Scholar
DOI
RTF
EndNote XML
Cooperation Model for Establishing Secure Digital Transformation in Corporations: Overview of Regulatory Issues
Saranov, Nikola
.
"
Cooperation Model for Establishing Secure Digital Transformation in Corporations: Overview of Regulatory Issues
."
Information & Security: An International Journal
43, no. 1 (2019): 98-112.
4309_cooperation_regulatory_issues.pdf
— Downloaded 3258 times
Read more
about Cooperation Model for Establishing Secure Digital Transformation in Corporations: Overview of Regulatory Issues
10427 reads
Google Scholar
DOI
RTF
EndNote XML
Quantum-Based Solutions for the Next-Generation Internet
Niemiec, Marcin
,
Andrzej Dziech
,
Miłosz Stypiński
, and
Jan Derkacz
.
"
Quantum-Based Solutions for the Next-Generation Internet
."
Information & Security: An International Journal
43, no. 1 (2019): 62-72.
4306_quantum-based_internet.pdf
— Downloaded 3999 times
Read more
about Quantum-Based Solutions for the Next-Generation Internet
11345 reads
Google Scholar
DOI
RTF
EndNote XML
Pages
« first
‹ previous
1
2
3
4
5
6
7
8
9
next ›
last »
Search form
Search
Information & Security journal
I&S Volumes
Policy
Editorial Board
Active Calls
Copyright & Licensing
Indexing & Archiving
Submit a paper
Books & Papers
Top downloads
Previews
On Inequalities Bounding Imprecision and Nonspecificity Measures of Uncertainty
On the Effectiveness of Measures of Uncertainty of Basic Belief Assignments
Blockchain in Agriculture
Multi-UAV Mission Planning for Monitoring Critical Infrastructures Considering Failures and Cyberattacks
A Hybrid Intrusion Detection with Decision Tree for Feature Selection
European Conflict Analysis Project (ECAP)
Generalized Net Model of the Water Resources Assessment Process and Water Use Management
view all
News
14/08/2020
Nanotechnology and Global Security
14/08/2020
Nanotechnology and Global Security
13/08/2020
How Improved Attribution in Cyber Warfare Can Help De-Escalate Cyber Arms Race
13/08/2020
Hybrid War: High-tech, Information and Cyber Conflicts
13/08/2020
The Age of Post-Truth: State Influence and Strategic Communication - Contemporary Security Challenges on Europe’s Eastern Flank:
11/08/2020
How Improved Attribution in Cyber Warfare Can Help De-Escalate Cyber Arms Race
10/08/2020
Social Media accounts
10/07/2020
The Winter 2020 issue of Connections
10/10/2018
The Summer-Fall 2018 issue of Connections
10/04/2018
The Winter 2018 issue of Connections
view all