Biblio

Export 72 results:
Filters: Keyword is Cybersecurity  [Clear All Filters]
2022
Iliev, Iliyan, and Ivan Blagoev. "An Approach to Improve Web Video Streaming Security and Prevent Personal Data Leakage." Information & Security: An International Journal 53, no. 1 (2022): 78-88 .
Georgiev, Venelin. The ‘Balance’ As a Panacea for Achieving (Cyber)Security In IT4Sec Reports., 2022.
Mednikarov, Boyan, Yuliyan Tsonev, Borislav Nikolov, and Andon Lazarov. "Cyber Hygiene Issues in the Naval Security Environment." Information & Security: An International Journal 53, no. 2 (2022): 205-218.
Georgiev, Venelin. Cyber Security Capabilities Maturity Model Based on a Balanced Scorecard In IT4Sec Reports., 2022.
Almén, Casper, Nicholas Hagström, and Jyri Rajamäki. "ECHO Early Warning System as a Preventive Tool against Cybercrime in the Energy Sector." Information & Security: An International Journal 53, no. 1 (2022): 11-20.
Jurgała, Piotr, Tytus Kurek, and Marcin Niemiec. "Preserving Privacy of Security Services in the SecaaS Model." Information & Security: An International Journal 53, no. 1 (2022): 47-64 .
Sharkov, George, Christina Todorova, Georgi Koykov, and Ivan Nikolov. "Towards a Robust and Scalable Cyber Range Federation for Sectoral Cyber/Hybrid Exercising: The Red Ranger and ECHO Collaborative Experience." Information & Security: An International Journal 53, no. 2 (2022): 287-302.
2021
Georgiev, Venelin. Comparative Analysis of Models for Assessing the Maturity of Cybersecurity Capabilities In IT4Sec Reports., 2021.
Ivanov, Yordan Shterev. "Concepts in Networks and Communication Security and Graph Theory." Information & Security: An International Journal 50, no. 2 (2021): 205-210 .
Holovkin, Bohdan M., Oleksii V. Tavolzhanskyi, and Oleksandr V. Lysodyed. "Corruption as a Cybersecurity Threat in the New World Order." Connections: The Quarterly Journal 20, no. 2 (2021): 75-87.
Ruoslahti, Harri, Janel Coburn, Amir Trent, and Ilkka Tikanmäki. "Cyber Skills Gaps – A Systematic Review of the Academic Literature." Connections: The Quarterly Journal 20, no. 2 (2021): 33-45.
Rajamäki, Jyri, and Heikki Hämäläinen. "Ethics of Cybersecurity and Biomedical Ethics: Case SHAPES." Information & Security: An International Journal 50, no. 1 (2021): 103-116 .
Gdowski, Bartłomiej, Rafał Kościej, and Marcin Niemiec. "Heuristic-based Intrusion Detection Functionality in a Snort Environment." Information & Security: An International Journal 50, no. 1 (2021): 23-36 .
Panagiotou, Panos, Notis Mengidis, Theodora Tsikrika, Stefanos Vrochidis, and Ioannis Kompatsiaris. "Host-based Intrusion Detection Using Signature-based and AI-driven Anomaly Detection Methods." Information & Security: An International Journal 50, no. 1 (2021): 37-48 .
Wallis, Tania, Chris Johnson, and Mohamed Khamis. "Interorganizational Cooperation in Supply Chain Cybersecurity: A Cross-Industry Study of the Effectiveness of the UK Implementation of the NIS Directive." Information & Security: An International Journal 48, no. 1 (2021): 36-68.
Turčaník, Michal. "Network User Behaviour Analysis by Machine Learning Methods." Information & Security: An International Journal 50, no. 1 (2021): 66-78 .
Blagoev, Ivan, Todor Balabanov, and Iliyan Iliev. "RSA Weaknesses Caused by the Specifics of Random Number Generation." Information & Security: An International Journal 50, no. 2 (2021): 171-179 .
Sharkov, George, Christina Todorova, Georgi Koykov, and Georgi Zahariev. "A System-of-Systems Approach for the Creation of a Composite Cyber Range for Cyber/Hybrid Exercising." Information & Security: An International Journal 50, no. 2 (2021): 129-148 .

Pages