Skip to main content
Procon Ltd. Information & Security: An International Journal
About
Business areas
Business Process
Business Intelligence
Knowledge Dissemination
Studies
Publishing
Partners
News
Books & Papers
Books
Authors
Keywords
You are here
Home
»
Cybersecurity
»
Education & Training
Education & Training
Education & Training
Education & Training, Cyber exercises
Hybrid War: High-tech, Information and Cyber Conflicts
Danyk, Yuriy
,
Tamara Maliarchuk
, and
Chad Briggs
.
"
Hybrid War: High-tech, Information and Cyber Conflicts
."
Connections: The Quarterly Journal
16, no. 2 (2017): 5-24.
Danyk, Hybrid war
— Downloaded 6596 times
Read more
about Hybrid War: High-tech, Information and Cyber Conflicts
52333 reads
Google Scholar
DOI
RTF
EndNote XML
Cybersecurity: A Generic Reference Curriculum
Costigan, Sean S.
,
Michael A. Hennessy
,
Scott Knight
,
Dinos Kerigan-Kyrou
,
Philip Lark
,
Chris Pallaris
,
Daniel Peder Bagge
,
Gigi Roman
,
Natalia Spinu
,
Todor Tagarev
et al.
Cybersecurity: A Generic Reference Curriculum
. Kingston, ON: National Defence, 2016.
Read more
about Cybersecurity: A Generic Reference Curriculum
13881 reads
Google Scholar
RTF
EndNote XML
A Generic Reference Curriculum on Cybersecurity
Tagarev, Todor
.
"
A Generic Reference Curriculum on Cybersecurity
."
Information & Security: An International Journal
35, no. 2 (2016): 181-184.
Cybersecurity Reference Curriculum
— Downloaded 4266 times
Read more
about A Generic Reference Curriculum on Cybersecurity
13766 reads
Google Scholar
DOI
RTF
EndNote XML
Smart Grid Safety and Security: Educational and Research Activities
Brezhniev, Eugene
, and
Vyacheslav Kharchenko
.
"
Smart Grid Safety and Security: Educational and Research Activities
."
Information & Security: An International Journal
35, no. 2 (2016): 165-178.
Smart GRID Safety and Security
— Downloaded 4411 times
Read more
about Smart Grid Safety and Security: Educational and Research Activities
12278 reads
Google Scholar
DOI
RTF
EndNote XML
Integrating Cisco Systems’ Educational Programs in ICT Security Academic Curricula
Gordieiev, Oleksandr
,
Taras Lobur
, and
Ruslan Kozak
.
"
Integrating Cisco Systems’ Educational Programs in ICT Security Academic Curricula
."
Information & Security: An International Journal
35, no. 2 (2016): 151-163.
Cisco in ICT Security Academic Curricula
— Downloaded 4129 times
Read more
about Integrating Cisco Systems’ Educational Programs in ICT Security Academic Curricula
11419 reads
Google Scholar
DOI
RTF
EndNote XML
Formal and Intelligent Methods for Security and Resilience: Education and Training Issues
Pomorova, Oksana
, and
Sergii Lysenko
.
"
Formal and Intelligent Methods for Security and Resilience: Education and Training Issues
."
Information & Security: An International Journal
35, no. 2 (2016): 133-150.
Formal and Intelligent Methods
— Downloaded 3888 times
Read more
about Formal and Intelligent Methods for Security and Resilience: Education and Training Issues
12531 reads
Google Scholar
DOI
RTF
EndNote XML
An Experience Report on Education and Training Programme in Cybersecurity of Critical Infrastructures
Skarga-Bandurova, Inna
,
Alexandr Ryazantsev
, and
Katerina Kiryushatova
.
"
An Experience Report on Education and Training Programme in Cybersecurity of Critical Infrastructures
."
Information & Security: An International Journal
35, no. 2 (2016): 123-132.
Cyber Security of Critical Infrastructures
— Downloaded 5410 times
Read more
about An Experience Report on Education and Training Programme in Cybersecurity of Critical Infrastructures
12980 reads
Google Scholar
DOI
RTF
EndNote XML
Imeca-Based Technique for Security Assessment of Private Communications: Technology and Training
Androulidakis, Iosif
,
Vyacheslav Kharchenko
, and
Andriy Kovalenko
.
"
Imeca-Based Technique for Security Assessment of Private Communications: Technology and Training
."
Information & Security: An International Journal
35, no. 1 (2016): 99-120.
IMECA-private communications-training
— Downloaded 4211 times
Read more
about Imeca-Based Technique for Security Assessment of Private Communications: Technology and Training
11925 reads
Google Scholar
DOI
RTF
EndNote XML
Development of Tools for Practical Research on Cybersecurity in Msc Theses
Zhukovyts’kyy, Igor
, and
Denis Ostapec
.
"
Development of Tools for Practical Research on Cybersecurity in Msc Theses
."
Information & Security: An International Journal
35, no. 1 (2016): 81-97.
Cyber research MSc thesis
— Downloaded 3801 times
Read more
about Development of Tools for Practical Research on Cybersecurity in Msc Theses
14147 reads
Google Scholar
DOI
RTF
EndNote XML
Cyber Security Teaching and Learning Laboratories: A Survey
Topham, Luke
,
Kashif Kifayat
,
Younis A. Younis
,
Qi Shi
, and
Bob Askwith
.
"
Cyber Security Teaching and Learning Laboratories: A Survey
."
Information & Security: An International Journal
35, no. 1 (2016): 51-80.
Cyber Laboratory Survey
— Downloaded 5453 times
Read more
about Cyber Security Teaching and Learning Laboratories: A Survey
15965 reads
Google Scholar
DOI
RTF
EndNote XML
Pages
« first
‹ previous
1
2
3
next ›
last »
Search form
Search
Information & Security journal
I&S Volumes
Policy
Editorial Board
Active Calls
Copyright & Licensing
Indexing & Archiving
Submit a paper
Books & Papers
Top downloads
Previews
On Inequalities Bounding Imprecision and Nonspecificity Measures of Uncertainty
On the Effectiveness of Measures of Uncertainty of Basic Belief Assignments
Blockchain in Agriculture
Multi-UAV Mission Planning for Monitoring Critical Infrastructures Considering Failures and Cyberattacks
A Hybrid Intrusion Detection with Decision Tree for Feature Selection
European Conflict Analysis Project (ECAP)
Generalized Net Model of the Water Resources Assessment Process and Water Use Management
view all
News
14/08/2020
Nanotechnology and Global Security
14/08/2020
Nanotechnology and Global Security
13/08/2020
How Improved Attribution in Cyber Warfare Can Help De-Escalate Cyber Arms Race
13/08/2020
Hybrid War: High-tech, Information and Cyber Conflicts
13/08/2020
The Age of Post-Truth: State Influence and Strategic Communication - Contemporary Security Challenges on Europe’s Eastern Flank:
11/08/2020
How Improved Attribution in Cyber Warfare Can Help De-Escalate Cyber Arms Race
10/08/2020
Social Media accounts
10/07/2020
The Winter 2020 issue of Connections
10/10/2018
The Summer-Fall 2018 issue of Connections
10/04/2018
The Winter 2018 issue of Connections
view all