One-way Function Based on Modified Cellular Automata in the Diffie-Hellman Algorithm for Big Data Exchange Tasks through Open Space Author(s): V. Shevchenko; G. Dimitrov; D. Berestov; P. Petrova; I. Sinitcyn; E. Kovatcheva; I. Garvanov; I. Kostadinova 15 May 2020
Signature-based Intrusion Detection Hardware-Software Complex Author(s): I.V. Stetsenko; M. Demydenko 15 May 2020
Cyber Threat Prediction with Machine Learning Author(s): A. Kok; I.Ilic Mestric; G. Valiyev; M. Street 15 May 2020
Adopting Machine Learning for Images Transferred with LoRaWAN Author(s): M. Brazhenenko; V. Shevchenko; O. Bychkov; B. Jekov; P. Petrova; E. Kovatcheva 15 May 2020
Data Science as a Service: The Data Range Author(s): P. Lenk; M. Street; I.Ilic Mestric; A. Kok; G. Valiyev; P. Le Cerf; B. Lorincz 15 May 2020
Tactical Approach to Cyber Defence in IoT Computer Networks Author(s): E. Staneva; M. Rachev 15 May 2020
A Cost-Effective Approach to Securing Systems through Partial Decentralization Author(s): N. Savchenko; V. Tsyganok; O. Andriichuk 15 May 2020
Resilience Management Framework for Critical Information Infrastructure: Designing the Level of Trust that Encourages the Exchange of Health Data Author(s): J. Rajamäki 15 May 2020
Cybernetic Approach to Developing Resilient Systems: Concept, Models and Application Author(s): V. Kharchenko; S. Dotsenko; Y. Ponochovnyi; O. Illiashenko 15 May 2020
Neglected Cybersecurity Risks in the Public Internet Hosting Service Providers Author(s): I. Blagoev 15 May 2020
A System for Analysis of Big Data from Social Media Author(s): D. Lande; I. Subach; A. Puchkov 15 May 2020
Analysis of Cybersecurity Issues in the Maritime Industry Author(s): B. Mednikarov; Y. Tsonev; A. Lazarov 15 May 2020
A Logical Model for Multi-Sector Cyber Risk Management Author(s): T. Tagarev; S.Marco Pappalardo; N. Stoianov 15 May 2020
How Improved Attribution in Cyber Warfare Can Help De-Escalate Cyber Arms Race Author(s): S. Goel 24 Apr 2020
National Cyber Security Strategy and the Emergence of Strong Digital Borders Author(s): S. Goel 24 Apr 2020
Cybersecurity in Switzerland: Challenges and the Way Forward for the Swiss Armed Forces Author(s): M. Baezner 24 Apr 2020
Austria’s National Cyber Security and Defense Policy: Challenges and the Way Forward Author(s): H. Kaponig 24 Apr 2020
Cyber Defence in Germany: Challenges and the Way Forward for the Bundeswehr Author(s): L. Leinhos 24 Apr 2020
Integrated Model of Knowledge Management for Security of Information Technologies: Standards ISO/IEC 15408 and ISO/IEC 18045 Author(s): S. Dotsenko; O. Illiashenko; S. Kamenskyi; V. Kharchenko 10 Sep 2019
Integrated Security Management System for Enterprises in Industry 4.0 Author(s): S. Dotsenko; O. Illiashenko; S. Kamenskyi; V. Kharchenko 10 Sep 2019
Analysis of the Global Attack Landscape Using Data from a Telnet Honeypot Author(s): V. Bontchev; V. Yosifova 10 Sep 2019
Generalized Net Model of an Automated System for Monitoring, Analysing and Managing Events Related to Information Security Author(s): I. Vardeva 10 Sep 2019