Skip to main content
Procon Ltd. Information & Security: An International Journal
About
Business areas
Business Process
Business Intelligence
Knowledge Dissemination
Studies
Publishing
Partners
News
Books & Papers
Books
Authors
Keywords
You are here
Home
»
Cybersecurity
»
Cyber threats
Cyber threats
Cyber threats
Cyber threats, scenarios, ...
Graphic Model of The Target Audience of Psychological Influence in Social Networks
Savchuk, Vlada
.
"
Graphic Model of The Target Audience of Psychological Influence in Social Networks
."
Information & Security: An International Journal
41 (2018): 81-93.
4106_savchuk.pdf
— Downloaded 3563 times
Read more
about Graphic Model of The Target Audience of Psychological Influence in Social Networks
12998 reads
Google Scholar
DOI
RTF
EndNote XML
Methodological Foundation of State’s Information Security in Social Networking Services in Conditions of Hybrid War
Hryshchuk, Ruslan
, and
Katerina Molodetska-Hrynhchuk
.
"
Methodological Foundation of State’s Information Security in Social Networking Services in Conditions of Hybrid War
."
Information & Security: An International Journal
41 (2018): 61-79.
4105_hryshchuk_molodetska.pdf
— Downloaded 1930 times
Read more
about Methodological Foundation of State’s Information Security in Social Networking Services in Conditions of Hybrid War
13121 reads
Google Scholar
DOI
RTF
EndNote XML
Information Sharing for Cyber Threats
Rizov, Vasil
.
"
Information Sharing for Cyber Threats
."
Information & Security: An International Journal
39, no. 1 (2018): 43-50.
3904_rizov_information_sharing.pdf
— Downloaded 5905 times
Read more
about Information Sharing for Cyber Threats
14305 reads
Google Scholar
DOI
RTF
EndNote XML
A Software Tool ASR for a posteriori Cryptanalysis on Public Keys Generated with ‘RSA’
Baicheva, Tsonka
, and
Miroslav Dimitrov
.
"
A Software Tool ASR for a posteriori Cryptanalysis on Public Keys Generated with ‘RSA’
."
Information & Security: An International Journal
37 (2017): 29-34.
3702_software_tool_asr.pdf
— Downloaded 708 times
Read more
about A Software Tool ASR for a posteriori Cryptanalysis on Public Keys Generated with ‘RSA’
10094 reads
Google Scholar
DOI
RTF
EndNote XML
From Cryptology to Cyber Resilience – Bridging Theory and Practice
Sharkov, George
.
"
From Cryptology to Cyber Resilience – Bridging Theory and Practice
."
Information & Security: An International Journal
37 (2017): 5-7.
3700_cryptology_cyber_resilience.pdf
— Downloaded 580 times
Read more
about From Cryptology to Cyber Resilience – Bridging Theory and Practice
2730 reads
Google Scholar
DOI
RTF
EndNote XML
Hybrid War: High-tech, Information and Cyber Conflicts
Danyk, Yuriy
,
Tamara Maliarchuk
, and
Chad Briggs
.
"
Hybrid War: High-tech, Information and Cyber Conflicts
."
Connections: The Quarterly Journal
16, no. 2 (2017): 5-24.
Danyk, Hybrid war
— Downloaded 7143 times
Read more
about Hybrid War: High-tech, Information and Cyber Conflicts
54570 reads
Google Scholar
DOI
RTF
EndNote XML
Cybersecurity: A Generic Reference Curriculum
Costigan, Sean S.
,
Michael A. Hennessy
,
Scott Knight
,
Dinos Kerigan-Kyrou
,
Philip Lark
,
Chris Pallaris
,
Daniel Peder Bagge
,
Gigi Roman
,
Natalia Spinu
,
Todor Tagarev
et al.
Cybersecurity: A Generic Reference Curriculum
. Kingston, ON: National Defence, 2016.
Read more
about Cybersecurity: A Generic Reference Curriculum
14973 reads
Google Scholar
RTF
EndNote XML
A Comprehensive Approach to Cyber Security –Trends, Challenges and the Way Forward
Perl, Raphael
, and
Nemanja Malisevic
.
"
A Comprehensive Approach to Cyber Security –Trends, Challenges and the Way Forward
." In
The Dangerous Landscape
, 47-61., 2013.
A Comprehensive Approach to Cyber Security
— Downloaded 4424 times
Read more
about A Comprehensive Approach to Cyber Security –Trends, Challenges and the Way Forward
14615 reads
Google Scholar
RTF
EndNote XML
Cyberspace as the Environment Affected by Organized Crime Activity
Dela, Piotr
.
"
Cyberspace as the Environment Affected by Organized Crime Activity
."
Connections: The Quarterly Journal
15, no. 3 (2016): 55-64.
Cyberspace Affected by Organized Crime
— Downloaded 5590 times
Read more
about Cyberspace as the Environment Affected by Organized Crime Activity
19994 reads
Google Scholar
DOI
RTF
EndNote XML
The Use of the Internet by Terrorist Organizations
Rusumanov, Vase
.
"
The Use of the Internet by Terrorist Organizations
."
Information & Security: An International Journal
34, no. 2 (2016): 137-150.
3409_rusumanov_use_of_the_internet_by_terrorist_organizations.pdf
— Downloaded 5757 times
Read more
about The Use of the Internet by Terrorist Organizations
16567 reads
Google Scholar
DOI
RTF
EndNote XML
Pages
« first
‹ previous
1
2
3
4
next ›
last »
Search form
Search
Information & Security journal
I&S Volumes
Policy
Editorial Board
Active Calls
Copyright & Licensing
Indexing & Archiving
Submit a paper
Books & Papers
Top downloads
Previews
On Inequalities Bounding Imprecision and Nonspecificity Measures of Uncertainty
On the Effectiveness of Measures of Uncertainty of Basic Belief Assignments
Blockchain in Agriculture
Multi-UAV Mission Planning for Monitoring Critical Infrastructures Considering Failures and Cyberattacks
A Hybrid Intrusion Detection with Decision Tree for Feature Selection
European Conflict Analysis Project (ECAP)
Generalized Net Model of the Water Resources Assessment Process and Water Use Management
view all
News
14/08/2020
Nanotechnology and Global Security
14/08/2020
Nanotechnology and Global Security
13/08/2020
How Improved Attribution in Cyber Warfare Can Help De-Escalate Cyber Arms Race
13/08/2020
Hybrid War: High-tech, Information and Cyber Conflicts
13/08/2020
The Age of Post-Truth: State Influence and Strategic Communication - Contemporary Security Challenges on Europe’s Eastern Flank:
11/08/2020
How Improved Attribution in Cyber Warfare Can Help De-Escalate Cyber Arms Race
10/08/2020
Social Media accounts
10/07/2020
The Winter 2020 issue of Connections
10/10/2018
The Summer-Fall 2018 issue of Connections
10/04/2018
The Winter 2018 issue of Connections
view all