Skip to main content
IT for Security
Team
Researchers
Associates
Support Staff
PHD Students
Projects
Ongoing
Upcoming
Finalized
Courses
Defence policy
Security Studies
Cybersecurity
Administration
Management
Economics
Innovations
Themes
all courses
Resources
Publications
IT4Sec Reports
CSDM Views
Presentations
Books
Events
Partners
Contact
You are here
Home
»
Cybersecurity
Cybersecurity
Cybersecurity
Cybersecurity
A Hybrid Intrusion Detection with Decision Tree for Feature Selection
Umar, Mubarak Albarka
,
Zhanfang Chen
, and
Yan Liu
.
A Hybrid Intrusion Detection with Decision Tree for Feature Selection
In
Information & Security: An International Journal
. Vol. 49., 2021.
4901_a_hybrid_id_with_decision_tree_for_fs_preview.pdf
— Downloaded 2599 times
Read more
about A Hybrid Intrusion Detection with Decision Tree for Feature Selection
6183 reads
Google Scholar
DOI
RTF
EndNote XML
Interorganizational Cooperation in Supply Chain Cybersecurity: A Cross-Industry Study of the Effectiveness of the UK Implementation of the NIS Directive
Wallis, Tania
,
Chris Johnson
, and
Mohamed Khamis
.
"
Interorganizational Cooperation in Supply Chain Cybersecurity: A Cross-Industry Study of the Effectiveness of the UK Implementation of the NIS Directive
."
Information & Security: An International Journal
48, no. 1 (2021): 36-68.
4812_supply_chain_cybersecurity.pdf
— Downloaded 881 times
Read more
about Interorganizational Cooperation in Supply Chain Cybersecurity: A Cross-Industry Study of the Effectiveness of the UK Implementation of the NIS Directive
3339 reads
Google Scholar
DOI
RTF
EndNote XML
A Model of a Cyber Defence Awareness System of Campaigns with Malicious Information
Stoianov, Nikolai
, and
Maya Bozhilova
.
"
A Model of a Cyber Defence Awareness System of Campaigns with Malicious Information
."
Information & Security: An International Journal
46, no. 2 (2020): 182-197.
4613_cyber_defence_awareness.pdf
— Downloaded 3036 times
Read more
about A Model of a Cyber Defence Awareness System of Campaigns with Malicious Information
9240 reads
Google Scholar
DOI
RTF
EndNote XML
Cryptographic Key Generation by Genetic Algorithms
Turčaník, Michal
, and
Martin Javurek
.
"
Cryptographic Key Generation by Genetic Algorithms
."
Information & Security: An International Journal
43, no. 1 (2019): 54-61.
4305_genetic_algorithms_crypto.pdf
— Downloaded 3698 times
Read more
about Cryptographic Key Generation by Genetic Algorithms
9728 reads
Google Scholar
DOI
RTF
EndNote XML
Generalized Net Model of Possible Drone’s Communication Control Cyber Theft with Intuitionistic Fuzzy Estimations
Bozveliev, Boris
,
Sotir Sotirov
, and
Tihomir Videv
.
"
Generalized Net Model of Possible Drone’s Communication Control Cyber Theft with Intuitionistic Fuzzy Estimations
."
Information & Security: An International Journal
43, no. 1 (2019): 35-44.
4303_cyberattack_drones.pdf
— Downloaded 3788 times
Read more
about Generalized Net Model of Possible Drone’s Communication Control Cyber Theft with Intuitionistic Fuzzy Estimations
10957 reads
Google Scholar
DOI
RTF
EndNote XML
From Cryptology to Cyber Resilience – Bridging Theory and Practice
Sharkov, George
.
"
From Cryptology to Cyber Resilience – Bridging Theory and Practice
."
Information & Security: An International Journal
37 (2017): 5-7.
3700_cryptology_cyber_resilience.pdf
— Downloaded 592 times
Read more
about From Cryptology to Cyber Resilience – Bridging Theory and Practice
2797 reads
Google Scholar
DOI
RTF
EndNote XML
Cybersecurity: A Generic Reference Curriculum
Costigan, Sean S.
,
Michael A. Hennessy
,
Scott Knight
,
Dinos Kerigan-Kyrou
,
Philip Lark
,
Chris Pallaris
,
Daniel Peder Bagge
,
Gigi Roman
,
Natalia Spinu
,
Todor Tagarev
et al.
Cybersecurity: A Generic Reference Curriculum
. Kingston, ON: National Defence, 2016.
Read more
about Cybersecurity: A Generic Reference Curriculum
15057 reads
Google Scholar
RTF
EndNote XML
Cybersecurity Innovation in NATO: Lessons Learned and Recommendations
Wrona, Konrad
,
Tamsin Moye
,
Philippe Lagadec
,
Michael Street
,
Peter Lenk
, and
Frederic Jordan
.
"
Cybersecurity Innovation in NATO: Lessons Learned and Recommendations
."
Information & Security: An International Journal
36 (2017).
Cybersecurity Innovation in NATO
— Downloaded 6795 times
Read more
about Cybersecurity Innovation in NATO: Lessons Learned and Recommendations
15823 reads
Google Scholar
RTF
EndNote XML
Challenges to Human Factor for Advance Persistent Threats Proactive Identification in Modern Social Networks
Minchev, Zlatogor
.
"
Challenges to Human Factor for Advance Persistent Threats Proactive Identification in Modern Social Networks
."
Information & Security: An International Journal
34, no. 2 (2016): 123-136.
3405_minchev_id_ipts_in_social_networks.pdf
— Downloaded 2638 times
Read more
about Challenges to Human Factor for Advance Persistent Threats Proactive Identification in Modern Social Networks
19004 reads
Google Scholar
DOI
RTF
EndNote XML
English
Български
Search form
Search
Resources
Security policy
Cybersecurity
Policy and strategy
Organization
Cyber threats
Cyberwar & Cyberdefence
Standards & Technologies
Education & Training
Democratic oversight
Intelligence
Law Enforcement
Terrorism
Operations
Technologies & Industry
Personnel management
Acquisition Management
Strategy
Concepts and doctrine
Management
Defence economics
Financial management
Information & knowledge management
Simulation and Training
Change management
Decision-making
Good governance