Skip to main content
Procon Ltd. Information & Security: An International Journal
About
Business areas
Business Process
Business Intelligence
Knowledge Dissemination
Studies
Publishing
Partners
News
Contact
Books & Papers
Books
Authors
Keywords
You are here
Home
»
Information & knowledge management
»
Information security
Information security
Information security
Information security, cybersecrity, Cyberdefence
Design of Technical Methods for Analysing Network Security Based on Identification of Network Traffic Anomalies
Skiter, Ihor
,
Ivan Burmaka
, and
Andriy Sigayov
.
"
Design of Technical Methods for Analysing Network Security Based on Identification of Network Traffic Anomalies
."
Information & Security: An International Journal
47, no. 3 (2020): 306-316.
4722_identification_network_traffic_anomalies.pdf
— Downloaded 216 times
Read more
about Design of Technical Methods for Analysing Network Security Based on Identification of Network Traffic Anomalies
827 reads
Google Scholar
DOI
RTF
EndNote XML
Using the Cyber Situational Awareness Concept for Protection of Agricultural Enterprise Management Information Systems
Nekhai, Valentin V.
,
Mariia Dorosh
, and
Valentin A. Nekhai
.
"
Using the Cyber Situational Awareness Concept for Protection of Agricultural Enterprise Management Information Systems
."
Information & Security: An International Journal
46, no. 2 (2020): 168-181.
4612_sa_agricultural.pdf
— Downloaded 220 times
Read more
about Using the Cyber Situational Awareness Concept for Protection of Agricultural Enterprise Management Information Systems
823 reads
Google Scholar
DOI
RTF
EndNote XML
MonSys: A Scalable Platform for Monitoring Digital Services Availability, Threat Intelligence and Cyber Resilience Situational Awareness
Sharkov, George
,
Yavor Papazov
,
Christina Todorova
,
Georgi Koykov
, and
Georgi Zahariev
.
"
MonSys: A Scalable Platform for Monitoring Digital Services Availability, Threat Intelligence and Cyber Resilience Situational Awareness
."
Information & Security: An International Journal
46, no. 2 (2020): 155-167.
4611_monsys.pdf
— Downloaded 280 times
Read more
about MonSys: A Scalable Platform for Monitoring Digital Services Availability, Threat Intelligence and Cyber Resilience Situational Awareness
1132 reads
Google Scholar
DOI
RTF
EndNote XML
Security Analysis of Diceware Passphrases
Antonov, Petar
, and
Nikoleta Georgieva
.
"
Security Analysis of Diceware Passphrases
."
Information & Security: An International Journal
47, no. 2 (2020): 276-282.
4719_diceware_passphrases.pdf
— Downloaded 253 times
Read more
about Security Analysis of Diceware Passphrases
886 reads
Google Scholar
DOI
RTF
EndNote XML
A New Steganographic Algorithm for Hiding Messages in Music
Bajor, Michał
, and
Marcin Niemiec
.
"
A New Steganographic Algorithm for Hiding Messages in Music
."
Information & Security: An International Journal
47, no. 2 (2020): 261-275.
4718_hiding_messages_in_music.pdf
— Downloaded 342 times
Read more
about A New Steganographic Algorithm for Hiding Messages in Music
1540 reads
Google Scholar
DOI
RTF
EndNote XML
One-way Function Based on Modified Cellular Automata in the Diffie-Hellman Algorithm for Big Data Exchange Tasks through Open Space
Shevchenko, Volodymyr
,
Georgi Dimitrov
,
Denys Berestov
,
Pepa Petrova
,
Igor Sinitcyn
,
Eugenia Kovatcheva
,
Ivan Garvanov
, and
Iva Kostadinova
.
"
One-way Function Based on Modified Cellular Automata in the Diffie-Hellman Algorithm for Big Data Exchange Tasks through Open Space
."
Information & Security: An International Journal
47, no. 2 (2020): 233-246.
4716_diffie-hellman_big_data.pdf
— Downloaded 223 times
Read more
about One-way Function Based on Modified Cellular Automata in the Diffie-Hellman Algorithm for Big Data Exchange Tasks through Open Space
790 reads
Google Scholar
DOI
RTF
EndNote XML
Adopting Machine Learning for Images Transferred with LoRaWAN
Brazhenenko, Maksym
,
Victor Shevchenko
,
Oleksiy Bychkov
,
Boyan Jekov
,
Pepa Petrova
, and
Eugenia Kovatcheva
.
"
Adopting Machine Learning for Images Transferred with LoRaWAN
."
Information & Security: An International Journal
47, no. 2 (2020): 172-186.
4712_adopting_machine_learning_for_images.pdf
— Downloaded 234 times
Read more
about Adopting Machine Learning for Images Transferred with LoRaWAN
949 reads
Google Scholar
DOI
RTF
EndNote XML
Neglected Cybersecurity Risks in the Public Internet Hosting Service Providers
Blagoev, Ivan
.
"
Neglected Cybersecurity Risks in the Public Internet Hosting Service Providers
."
Information & Security: An International Journal
47, no. 1 (2020): 62-76.
4704_cybersec_risks_hosting_providers.pdf
— Downloaded 208 times
Read more
about Neglected Cybersecurity Risks in the Public Internet Hosting Service Providers
811 reads
Google Scholar
DOI
RTF
EndNote XML
A System for Analysis of Big Data from Social Media
Lande, Dmytro
,
Igor Subach
, and
Alexander Puchkov
.
"
A System for Analysis of Big Data from Social Media
."
Information & Security: An International Journal
47, no. 1 (2020): 44-61.
4703_big_data_social_media.pdf
— Downloaded 200 times
Read more
about A System for Analysis of Big Data from Social Media
2099 reads
Google Scholar
DOI
RTF
EndNote XML
Common Ground: U.S. and NATO Engagement with Russia in the Cyber Domain
Van Epps, Geoff
.
"
Common Ground: U.S. and NATO Engagement with Russia in the Cyber Domain
."
Connections: The Quarterly Journal
12, no. 4 (2013): 15-50.
12.4.02_Van_Epps.pdf
— Downloaded 5102 times
Read more
about Common Ground: U.S. and NATO Engagement with Russia in the Cyber Domain
32241 reads
Google Scholar
DOI
RTF
EndNote XML
Search form
Search
Information & Security journal
I&S Volumes
Policy
Editorial Board
Active Calls
Copyright & Licensing
Indexing & Archiving
Submit a paper
Books & Papers
Top downloads
Previews
NATO-EU Cooperation in Cybersecurity and Cyber Defence Offers Unrivalled Advantages
Ecosystem Platform for the Defence and Security Sector of Ukraine
Information Assurance Benefits and Challenges: An Introduction
view all
News
14/08/2020
Nanotechnology and Global Security
14/08/2020
Nanotechnology and Global Security
13/08/2020
How Improved Attribution in Cyber Warfare Can Help De-Escalate Cyber Arms Race
13/08/2020
Hybrid War: High-tech, Information and Cyber Conflicts
13/08/2020
The Age of Post-Truth: State Influence and Strategic Communication - Contemporary Security Challenges on Europe’s Eastern Flank:
11/08/2020
How Improved Attribution in Cyber Warfare Can Help De-Escalate Cyber Arms Race
10/08/2020
Social Media accounts
10/07/2020
The Winter 2020 issue of Connections
10/10/2018
The Summer-Fall 2018 issue of Connections
10/04/2018
The Winter 2018 issue of Connections
view all