Skip to main content
Procon Ltd. Information & Security: An International Journal
About
Business areas
Business Process
Business Intelligence
Knowledge Dissemination
Studies
Publishing
Partners
News
Books & Papers
Books
Authors
Keywords
You are here
Home
»
Cybersecurity
»
Education & Training
Education & Training
Education & Training
Education & Training, Cyber exercises
Hybrid War: High-tech, Information and Cyber Conflicts
Danyk, Yuriy
,
Tamara Maliarchuk
, and
Chad Briggs
.
"
Hybrid War: High-tech, Information and Cyber Conflicts
."
Connections: The Quarterly Journal
16, no. 2 (2017): 5-24.
Danyk, Hybrid war
— Downloaded 7267 times
Read more
about Hybrid War: High-tech, Information and Cyber Conflicts
55091 reads
Google Scholar
DOI
RTF
EndNote XML
Cybersecurity: A Generic Reference Curriculum
Costigan, Sean S.
,
Michael A. Hennessy
,
Scott Knight
,
Dinos Kerigan-Kyrou
,
Philip Lark
,
Chris Pallaris
,
Daniel Peder Bagge
,
Gigi Roman
,
Natalia Spinu
,
Todor Tagarev
et al.
Cybersecurity: A Generic Reference Curriculum
. Kingston, ON: National Defence, 2016.
Read more
about Cybersecurity: A Generic Reference Curriculum
15211 reads
Google Scholar
RTF
EndNote XML
A Generic Reference Curriculum on Cybersecurity
Tagarev, Todor
.
"
A Generic Reference Curriculum on Cybersecurity
."
Information & Security: An International Journal
35, no. 2 (2016): 181-184.
Cybersecurity Reference Curriculum
— Downloaded 4766 times
Read more
about A Generic Reference Curriculum on Cybersecurity
15255 reads
Google Scholar
DOI
RTF
EndNote XML
Smart Grid Safety and Security: Educational and Research Activities
Brezhniev, Eugene
, and
Vyacheslav Kharchenko
.
"
Smart Grid Safety and Security: Educational and Research Activities
."
Information & Security: An International Journal
35, no. 2 (2016): 165-178.
Smart GRID Safety and Security
— Downloaded 4906 times
Read more
about Smart Grid Safety and Security: Educational and Research Activities
13376 reads
Google Scholar
DOI
RTF
EndNote XML
Integrating Cisco Systems’ Educational Programs in ICT Security Academic Curricula
Gordieiev, Oleksandr
,
Taras Lobur
, and
Ruslan Kozak
.
"
Integrating Cisco Systems’ Educational Programs in ICT Security Academic Curricula
."
Information & Security: An International Journal
35, no. 2 (2016): 151-163.
Cisco in ICT Security Academic Curricula
— Downloaded 4656 times
Read more
about Integrating Cisco Systems’ Educational Programs in ICT Security Academic Curricula
12543 reads
Google Scholar
DOI
RTF
EndNote XML
Formal and Intelligent Methods for Security and Resilience: Education and Training Issues
Pomorova, Oksana
, and
Sergii Lysenko
.
"
Formal and Intelligent Methods for Security and Resilience: Education and Training Issues
."
Information & Security: An International Journal
35, no. 2 (2016): 133-150.
Formal and Intelligent Methods
— Downloaded 4338 times
Read more
about Formal and Intelligent Methods for Security and Resilience: Education and Training Issues
13695 reads
Google Scholar
DOI
RTF
EndNote XML
An Experience Report on Education and Training Programme in Cybersecurity of Critical Infrastructures
Skarga-Bandurova, Inna
,
Alexandr Ryazantsev
, and
Katerina Kiryushatova
.
"
An Experience Report on Education and Training Programme in Cybersecurity of Critical Infrastructures
."
Information & Security: An International Journal
35, no. 2 (2016): 123-132.
Cyber Security of Critical Infrastructures
— Downloaded 6000 times
Read more
about An Experience Report on Education and Training Programme in Cybersecurity of Critical Infrastructures
14044 reads
Google Scholar
DOI
RTF
EndNote XML
Imeca-Based Technique for Security Assessment of Private Communications: Technology and Training
Androulidakis, Iosif
,
Vyacheslav Kharchenko
, and
Andriy Kovalenko
.
"
Imeca-Based Technique for Security Assessment of Private Communications: Technology and Training
."
Information & Security: An International Journal
35, no. 1 (2016): 99-120.
IMECA-private communications-training
— Downloaded 4841 times
Read more
about Imeca-Based Technique for Security Assessment of Private Communications: Technology and Training
13091 reads
Google Scholar
DOI
RTF
EndNote XML
Development of Tools for Practical Research on Cybersecurity in Msc Theses
Zhukovyts’kyy, Igor
, and
Denis Ostapec
.
"
Development of Tools for Practical Research on Cybersecurity in Msc Theses
."
Information & Security: An International Journal
35, no. 1 (2016): 81-97.
Cyber research MSc thesis
— Downloaded 4344 times
Read more
about Development of Tools for Practical Research on Cybersecurity in Msc Theses
15164 reads
Google Scholar
DOI
RTF
EndNote XML
Cyber Security Teaching and Learning Laboratories: A Survey
Topham, Luke
,
Kashif Kifayat
,
Younis A. Younis
,
Qi Shi
, and
Bob Askwith
.
"
Cyber Security Teaching and Learning Laboratories: A Survey
."
Information & Security: An International Journal
35, no. 1 (2016): 51-80.
Cyber Laboratory Survey
— Downloaded 6329 times
Read more
about Cyber Security Teaching and Learning Laboratories: A Survey
17546 reads
Google Scholar
DOI
RTF
EndNote XML
Pages
« first
‹ previous
1
2
3
next ›
last »
Search form
Search
Information & Security journal
I&S Volumes
Policy
Editorial Board
Active Calls
Copyright & Licensing
Indexing & Archiving
Submit a paper
Books & Papers
Top downloads
Previews
On Inequalities Bounding Imprecision and Nonspecificity Measures of Uncertainty
On the Effectiveness of Measures of Uncertainty of Basic Belief Assignments
Blockchain in Agriculture
Multi-UAV Mission Planning for Monitoring Critical Infrastructures Considering Failures and Cyberattacks
A Hybrid Intrusion Detection with Decision Tree for Feature Selection
European Conflict Analysis Project (ECAP)
Generalized Net Model of the Water Resources Assessment Process and Water Use Management
view all
News
14/08/2020
Nanotechnology and Global Security
14/08/2020
Nanotechnology and Global Security
13/08/2020
How Improved Attribution in Cyber Warfare Can Help De-Escalate Cyber Arms Race
13/08/2020
Hybrid War: High-tech, Information and Cyber Conflicts
13/08/2020
The Age of Post-Truth: State Influence and Strategic Communication - Contemporary Security Challenges on Europe’s Eastern Flank:
11/08/2020
How Improved Attribution in Cyber Warfare Can Help De-Escalate Cyber Arms Race
10/08/2020
Social Media accounts
10/07/2020
The Winter 2020 issue of Connections
10/10/2018
The Summer-Fall 2018 issue of Connections
10/04/2018
The Winter 2018 issue of Connections
view all