Skip to main content
Procon Ltd. Information & Security: An International Journal
About
Business areas
Business Process
Business Intelligence
Knowledge Dissemination
Studies
Publishing
Partners
News
Books & Papers
Books
Authors
Keywords
You are here
Home
»
Cybersecurity
»
Standards & Technologies
Standards & Technologies
Standards & Technologies
Standards & Technologies
Cybernetic Approach to Developing Resilient Systems: Concept, Models and Application
Kharchenko, Vyacheslav
,
Sergiy Dotsenko
,
Yuriy Ponochovnyi
, and
Oleg Illiashenko
.
"
Cybernetic Approach to Developing Resilient Systems: Concept, Models and Application
."
Information & Security: An International Journal
47, no. 1 (2020): 77-90.
4705_cybernetic_approach_resilient_systems.pdf
— Downloaded 3277 times
Read more
about Cybernetic Approach to Developing Resilient Systems: Concept, Models and Application
10477 reads
Google Scholar
DOI
RTF
EndNote XML
Analysis of Cybersecurity Issues in the Maritime Industry
Mednikarov, Boyan
,
Yuliyan Tsonev
, and
Andon Lazarov
.
"
Analysis of Cybersecurity Issues in the Maritime Industry
."
Information & Security: An International Journal
47, no. 1 (2020): 27-43.
4702_maritime_industry_cyber_security.pdf
— Downloaded 5752 times
Read more
about Analysis of Cybersecurity Issues in the Maritime Industry
12019 reads
Google Scholar
DOI
RTF
EndNote XML
Implementation of Cloud Technologies for Building Data Centers in Defence and Security
Iliev, Rosen
, and
Kristina Ignatova
.
"
Implementation of Cloud Technologies for Building Data Centers in Defence and Security
."
Information & Security: An International Journal
43, no. 1 (2019): 89-97.
4308_data_cetres_defence_security.pdf
— Downloaded 3392 times
Read more
about Implementation of Cloud Technologies for Building Data Centers in Defence and Security
10986 reads
Google Scholar
DOI
RTF
EndNote XML
Cyber-Physical Systems Security: Research Challenges and Opportunities
Shaikh, Siraj Ahmed
.
"
Cyber-Physical Systems Security: Research Challenges and Opportunities
.", 2019.
presentation_cyber-physical_systems_security.pdf
— Downloaded 1229 times
Read more
about Cyber-Physical Systems Security: Research Challenges and Opportunities
6460 reads
Google Scholar
RTF
EndNote XML
Self-Advertising Attack Surfaces for Web Application Honeypots: New Technology to Managing Cyber Disasters
Mphago, Banyatsang
,
Dimane Mpoeleng
,
Shedden Masupe
, and
Oteng Tabona
.
"
Self-Advertising Attack Surfaces for Web Application Honeypots: New Technology to Managing Cyber Disasters
."
Information & Security: An International Journal
40, no. 2 (2018): 189-202.
4014_self-advertising_honeypots.pdf
— Downloaded 3232 times
Read more
about Self-Advertising Attack Surfaces for Web Application Honeypots: New Technology to Managing Cyber Disasters
10921 reads
Google Scholar
DOI
RTF
EndNote XML
A Software Tool ASR for a posteriori Cryptanalysis on Public Keys Generated with ‘RSA’
Baicheva, Tsonka
, and
Miroslav Dimitrov
.
"
A Software Tool ASR for a posteriori Cryptanalysis on Public Keys Generated with ‘RSA’
."
Information & Security: An International Journal
37 (2017): 29-34.
3702_software_tool_asr.pdf
— Downloaded 954 times
Read more
about A Software Tool ASR for a posteriori Cryptanalysis on Public Keys Generated with ‘RSA’
10694 reads
Google Scholar
DOI
RTF
EndNote XML
Cyber Security and Resilience of Modern Societies: A Research Management Architecture
Tagarev, Todor
,
George Sharkov
, and
Nikolai Stoianov
.
"
Cyber Security and Resilience of Modern Societies: A Research Management Architecture
."
Information & Security: An International Journal
38 (2017): 93-108.
3807_Cybersecurity Research Management Architecture
— Downloaded 7033 times
Read more
about Cyber Security and Resilience of Modern Societies: A Research Management Architecture
17027 reads
Google Scholar
DOI
RTF
EndNote XML
Pages
« first
‹ previous
1
2
Search form
Search
Information & Security journal
I&S Volumes
Policy
Editorial Board
Active Calls
Copyright & Licensing
Indexing & Archiving
Submit a paper
Books & Papers
Top downloads
Previews
On Inequalities Bounding Imprecision and Nonspecificity Measures of Uncertainty
On the Effectiveness of Measures of Uncertainty of Basic Belief Assignments
Blockchain in Agriculture
Multi-UAV Mission Planning for Monitoring Critical Infrastructures Considering Failures and Cyberattacks
A Hybrid Intrusion Detection with Decision Tree for Feature Selection
European Conflict Analysis Project (ECAP)
Generalized Net Model of the Water Resources Assessment Process and Water Use Management
view all
News
14/08/2020
Nanotechnology and Global Security
14/08/2020
Nanotechnology and Global Security
13/08/2020
How Improved Attribution in Cyber Warfare Can Help De-Escalate Cyber Arms Race
13/08/2020
Hybrid War: High-tech, Information and Cyber Conflicts
13/08/2020
The Age of Post-Truth: State Influence and Strategic Communication - Contemporary Security Challenges on Europe’s Eastern Flank:
11/08/2020
How Improved Attribution in Cyber Warfare Can Help De-Escalate Cyber Arms Race
10/08/2020
Social Media accounts
10/07/2020
The Winter 2020 issue of Connections
10/10/2018
The Summer-Fall 2018 issue of Connections
10/04/2018
The Winter 2018 issue of Connections
view all