A Model of a Cyber Defence Awareness System of Campaigns with Malicious Information Author(s): Nikolai Stoianov, Maya Bozhilova14 Sep 2020
Information Sharing Models for Early Warning Systems of Cybersecurity Intelligence Author(s): Jyri Rajamäki, Vasilis Katos14 Sep 2020
The Influence of Knowledge and Attitude on Intention to Adopt Cybersecure Behaviour Author(s): Lisa de Kok, Deborah Oosting, Marcel Spruit14 Sep 2020
Educational NASA Project: Artificial Intelligence and Cybersecurity at a Mobile Lunar Base Author(s): Evgeni Andreev, Mariya Nikolova, Veselka Radeva14 Sep 2020
Comparison between the Cyber Operations Majors in the United States Naval Academy and the Bulgarian Naval Academy Author(s): Nikoleta Georgieva14 Sep 2020
Cybersecurity Problems and Solutions in Operating Systems of Mobile Communications Devices Author(s): Stoyan Mechev, Elisaveta Staneva, Mariyan Rachev14 Sep 2020
Model Fooling Attacks Against Medical Imaging: A Short Survey Author(s): Tuomo Sipola, Samir Puuska, Tero Kokkonen14 Sep 2020
Design of Technical Methods for Analysing Network Security Based on Identification of Network Traffic Anomalies Author(s): Ihor Skiter, Ivan Burmaka, Andriy Sigayov14 Sep 2020
MonSys: A Scalable Platform for Monitoring Digital Services Availability, Threat Intelligence and Cyber Resilience Situational Awareness Author(s): George Sharkov, Yavor Papazov, Christina Todorova, Georgi Koykov, Georgi Zahariev14 Sep 2020
A Governance Model for an EU Cyber Security Collaborative Network – ECSCON Author(s): Georgi Penchev, Antoniya Shalamanova-Filipova10 Sep 2020
Societal Impact Assessment of a Cyber Security Network Project Author(s): Kirsi Aaltola, Harri Ruoslahti10 Sep 2020
Organizational Learning in the Academic Literature – Systematic Literature Review Author(s): Harri Ruoslahti, Amir Trent10 Sep 2020
Cybernetic Approach to Developing Resilient Systems: Concept, Models and Application Author(s): Vyacheslav Kharchenko, Sergiy Dotsenko, Yuriy Ponochovnyi, Oleg Illiashenko15 May 2020
Signature-based Intrusion Detection Hardware-Software Complex Author(s): Inna Stetsenko, Maksym Demydenko15 May 2020
A Cost-Effective Approach to Securing Systems through Partial Decentralization Author(s): Nikita Savchenko, Vitaliy Tsyganok, Oleh Andriichuk15 May 2020
One-way Function Based on Modified Cellular Automata in the Diffie-Hellman Algorithm for Big Data Exchange Tasks through Open Space Author(s): Volodymyr Shevchenko, Georgi Dimitrov, Denys Berestov, Pepa Petrova, Igor Sinitcyn, Eugenia Kovatcheva, Ivan Garvanov, Iva Kostadinova15 May 2020
Neglected Cybersecurity Risks in the Public Internet Hosting Service Providers Author(s): Ivan Blagoev15 May 2020
Public Key Generation Principles Impact Cybersecurity Author(s): Nikolai Stoianov, Andrey Ivanov15 May 2020
Tactical Approach to Cyber Defence in IoT Computer Networks Author(s): Elisaveta Staneva, Mariyan Rachev15 May 2020
A Logical Model for Multi-Sector Cyber Risk Management Author(s): Todor Tagarev, Salvatore Pappalardo, Nikolai Stoianov15 May 2020
A New Steganographic Algorithm for Hiding Messages in Music Author(s): Michał Bajor, Marcin Niemiec15 May 2020
Data Science as a Service: The Data Range Author(s): Peter Lenk, Michael Street, Ivana Mestric, Arvid Kok, Giavid Valiyev, Philippe Le Cerf, Barbara Lorincz15 May 2020