Skip to main content
IT for Security
Team
Researchers
Associates
Support Staff
PHD Students
Projects
Ongoing
Upcoming
Finalized
Courses
Defence policy
Security Studies
Cybersecurity
Administration
Management
Economics
Innovations
Themes
all courses
Resources
Publications
IT4Sec Reports
CSDM Views
Presentations
Books
Events
Partners
Contact
You are here
Home
»
Information & knowledge management
»
Information security
Information security
Information security
Information security, cybersecrity, Cyberdefence
Launching Narrative into the Information Battlefield
Waldman, Suzanne
, and
Sean Havel
.
"
Launching Narrative into the Information Battlefield
."
Connections: The Quarterly Journal
21, no. 2 (2022): 111-122.
Introduction
21.2.08_launching_narrative_f.pdf
— Downloaded 1009 times
Read more
about Launching Narrative into the Information Battlefield
5701 reads
Google Scholar
DOI
RTF
EndNote XML
A Hybrid Intrusion Detection with Decision Tree for Feature Selection
Umar, Mubarak Albarka
,
Zhanfang Chen
, and
Yan Liu
.
A Hybrid Intrusion Detection with Decision Tree for Feature Selection
In
Information & Security: An International Journal
. Vol. 49., 2021.
4901_a_hybrid_id_with_decision_tree_for_fs_preview.pdf
— Downloaded 3098 times
Read more
about A Hybrid Intrusion Detection with Decision Tree for Feature Selection
7082 reads
Google Scholar
DOI
RTF
EndNote XML
Design of Technical Methods for Analysing Network Security Based on Identification of Network Traffic Anomalies
Skiter, Ihor
,
Ivan Burmaka
, and
Andriy Sigayov
.
"
Design of Technical Methods for Analysing Network Security Based on Identification of Network Traffic Anomalies
."
Information & Security: An International Journal
47, no. 3 (2020): 306-316.
4722_identification_network_traffic_anomalies.pdf
— Downloaded 3185 times
Read more
about Design of Technical Methods for Analysing Network Security Based on Identification of Network Traffic Anomalies
6778 reads
Google Scholar
DOI
RTF
EndNote XML
Using the Cyber Situational Awareness Concept for Protection of Agricultural Enterprise Management Information Systems
Nekhai, Valentin V.
,
Mariia Dorosh
, and
Valentin A. Nekhai
.
"
Using the Cyber Situational Awareness Concept for Protection of Agricultural Enterprise Management Information Systems
."
Information & Security: An International Journal
46, no. 2 (2020): 168-181.
4612_sa_agricultural.pdf
— Downloaded 3247 times
Read more
about Using the Cyber Situational Awareness Concept for Protection of Agricultural Enterprise Management Information Systems
7301 reads
Google Scholar
DOI
RTF
EndNote XML
MonSys: A Scalable Platform for Monitoring Digital Services Availability, Threat Intelligence and Cyber Resilience Situational Awareness
Sharkov, George
,
Yavor Papazov
,
Christina Todorova
,
Georgi Koykov
, and
Georgi Zahariev
.
"
MonSys: A Scalable Platform for Monitoring Digital Services Availability, Threat Intelligence and Cyber Resilience Situational Awareness
."
Information & Security: An International Journal
46, no. 2 (2020): 155-167.
4611_monsys.pdf
— Downloaded 3606 times
Read more
about MonSys: A Scalable Platform for Monitoring Digital Services Availability, Threat Intelligence and Cyber Resilience Situational Awareness
10180 reads
Google Scholar
DOI
RTF
EndNote XML
Security Analysis of Diceware Passphrases
Antonov, Petar
, and
Nikoleta Georgieva
.
"
Security Analysis of Diceware Passphrases
."
Information & Security: An International Journal
47, no. 2 (2020): 276-282.
4719_diceware_passphrases.pdf
— Downloaded 5221 times
Read more
about Security Analysis of Diceware Passphrases
8817 reads
Google Scholar
DOI
RTF
EndNote XML
A New Steganographic Algorithm for Hiding Messages in Music
Bajor, Michał
, and
Marcin Niemiec
.
"
A New Steganographic Algorithm for Hiding Messages in Music
."
Information & Security: An International Journal
47, no. 2 (2020): 261-275.
4718_hiding_messages_in_music.pdf
— Downloaded 4289 times
Read more
about A New Steganographic Algorithm for Hiding Messages in Music
10392 reads
Google Scholar
DOI
RTF
EndNote XML
One-way Function Based on Modified Cellular Automata in the Diffie-Hellman Algorithm for Big Data Exchange Tasks through Open Space
Shevchenko, Volodymyr
,
Georgi Dimitrov
,
Denys Berestov
,
Pepa Petrova
,
Igor Sinitcyn
,
Eugenia Kovatcheva
,
Ivan Garvanov
, and
Iva Kostadinova
.
"
One-way Function Based on Modified Cellular Automata in the Diffie-Hellman Algorithm for Big Data Exchange Tasks through Open Space
."
Information & Security: An International Journal
47, no. 2 (2020): 233-246.
4716_diffie-hellman_big_data.pdf
— Downloaded 3476 times
Read more
about One-way Function Based on Modified Cellular Automata in the Diffie-Hellman Algorithm for Big Data Exchange Tasks through Open Space
6560 reads
Google Scholar
DOI
RTF
EndNote XML
Adopting Machine Learning for Images Transferred with LoRaWAN
Brazhenenko, Maksym
,
Victor Shevchenko
,
Oleksiy Bychkov
,
Boyan Jekov
,
Pepa Petrova
, and
Eugenia Kovatcheva
.
"
Adopting Machine Learning for Images Transferred with LoRaWAN
."
Information & Security: An International Journal
47, no. 2 (2020): 172-186.
4712_adopting_machine_learning_for_images.pdf
— Downloaded 3354 times
Read more
about Adopting Machine Learning for Images Transferred with LoRaWAN
7497 reads
Google Scholar
DOI
RTF
EndNote XML
Neglected Cybersecurity Risks in the Public Internet Hosting Service Providers
Blagoev, Ivan
.
"
Neglected Cybersecurity Risks in the Public Internet Hosting Service Providers
."
Information & Security: An International Journal
47, no. 1 (2020): 62-76.
4704_cybersec_risks_hosting_providers.pdf
— Downloaded 3167 times
Read more
about Neglected Cybersecurity Risks in the Public Internet Hosting Service Providers
8251 reads
Google Scholar
DOI
RTF
EndNote XML
Pages
1
2
next ›
last »
English
Български
Search form
Search
Resources
Security policy
Cybersecurity
Intelligence
Law Enforcement
Terrorism
Operations
Technologies & Industry
Personnel management
Acquisition Management
Strategy
Concepts and doctrine
Management
Defence economics
Financial management
Information & knowledge management
Theoretical views
C4ISR
Information management
Knowledge management
Information security
Processes & Architectures
Simulation and Training
Change management
Decision-making
Good governance