One-way Function Based on Modified Cellular Automata in the Diffie-Hellman Algorithm for Big Data Exchange Tasks through Open Space Author(s): 15 мая 2020
A Cost-Effective Approach to Securing Systems through Partial Decentralization Author(s): 15 мая 2020
Resilience Management Framework for Critical Information Infrastructure: Designing the Level of Trust that Encourages the Exchange of Health Data Author(s): 15 мая 2020
Cybernetic Approach to Developing Resilient Systems: Concept, Models and Application Author(s): 15 мая 2020
Neglected Cybersecurity Risks in the Public Internet Hosting Service Providers Author(s): 15 мая 2020
How Improved Attribution in Cyber Warfare Can Help De-Escalate Cyber Arms Race Author(s): 24 Апр 2020
Cybersecurity in Switzerland: Challenges and the Way Forward for the Swiss Armed Forces Author(s): 24 Апр 2020
Austria’s National Cyber Security and Defense Policy: Challenges and the Way Forward Author(s): 24 Апр 2020
Integrated Model of Knowledge Management for Security of Information Technologies: Standards ISO/IEC 15408 and ISO/IEC 18045 Author(s): 10 Сен 2019
Generalized Net Model of an Automated System for Monitoring, Analysing and Managing Events Related to Information Security Author(s): 10 Сен 2019