Skip to main content
Security and Defence Management
About
Business areas
Business Process
Business Intelligence
Knowledge Dissemination
Studies
Publishing
Partners
News
Books & Papers
Books
Authors
Keywords
You are here
Home
»
Cybersecurity
Cybersecurity
Cybersecurity
Cybersecurity
A Hybrid Intrusion Detection with Decision Tree for Feature Selection
Umar, Mubarak Albarka
,
Zhanfang Chen
, and
Yan Liu
.
A Hybrid Intrusion Detection with Decision Tree for Feature Selection
In
Information & Security: An International Journal
. Vol. 49., 2021.
4901_a_hybrid_id_with_decision_tree_for_fs_preview.pdf
— Downloaded 3265 times
Read more
about A Hybrid Intrusion Detection with Decision Tree for Feature Selection
7879 reads
Google Scholar
DOI
RTF
EndNote XML
A Model of a Cyber Defence Awareness System of Campaigns with Malicious Information
Stoianov, Nikolai
, and
Maya Bozhilova
.
"
A Model of a Cyber Defence Awareness System of Campaigns with Malicious Information
."
Information & Security: An International Journal
46, no. 2 (2020): 182-197.
4613_cyber_defence_awareness.pdf
— Downloaded 3684 times
Read more
about A Model of a Cyber Defence Awareness System of Campaigns with Malicious Information
10547 reads
Google Scholar
DOI
RTF
EndNote XML
Cryptographic Key Generation by Genetic Algorithms
Turčaník, Michal
, and
Martin Javurek
.
"
Cryptographic Key Generation by Genetic Algorithms
."
Information & Security: An International Journal
43, no. 1 (2019): 54-61.
4305_genetic_algorithms_crypto.pdf
— Downloaded 4298 times
Read more
about Cryptographic Key Generation by Genetic Algorithms
10610 reads
Google Scholar
DOI
RTF
EndNote XML
Generalized Net Model of Possible Drone’s Communication Control Cyber Theft with Intuitionistic Fuzzy Estimations
Bozveliev, Boris
,
Sotir Sotirov
, and
Tihomir Videv
.
"
Generalized Net Model of Possible Drone’s Communication Control Cyber Theft with Intuitionistic Fuzzy Estimations
."
Information & Security: An International Journal
43, no. 1 (2019): 35-44.
4303_cyberattack_drones.pdf
— Downloaded 4367 times
Read more
about Generalized Net Model of Possible Drone’s Communication Control Cyber Theft with Intuitionistic Fuzzy Estimations
12131 reads
Google Scholar
DOI
RTF
EndNote XML
From Cryptology to Cyber Resilience – Bridging Theory and Practice
Sharkov, George
.
"
From Cryptology to Cyber Resilience – Bridging Theory and Practice
."
Information & Security: An International Journal
37 (2017): 5-7.
3700_cryptology_cyber_resilience.pdf
— Downloaded 954 times
Read more
about From Cryptology to Cyber Resilience – Bridging Theory and Practice
3664 reads
Google Scholar
DOI
RTF
EndNote XML
Cybersecurity: A Generic Reference Curriculum
Costigan, Sean S.
,
Michael A. Hennessy
,
Scott Knight
,
Dinos Kerigan-Kyrou
,
Philip Lark
,
Chris Pallaris
,
Daniel Peder Bagge
,
Gigi Roman
,
Natalia Spinu
,
Todor Tagarev
et al.
Cybersecurity: A Generic Reference Curriculum
. Kingston, ON: National Defence, 2016.
Read more
about Cybersecurity: A Generic Reference Curriculum
16128 reads
Google Scholar
RTF
EndNote XML
Cybersecurity Innovation in NATO: Lessons Learned and Recommendations
Wrona, Konrad
,
Tamsin Moye
,
Philippe Lagadec
,
Michael Street
,
Peter Lenk
, and
Frederic Jordan
.
"
Cybersecurity Innovation in NATO: Lessons Learned and Recommendations
."
Information & Security: An International Journal
36 (2017).
Cybersecurity Innovation in NATO
— Downloaded 7466 times
Read more
about Cybersecurity Innovation in NATO: Lessons Learned and Recommendations
16957 reads
Google Scholar
RTF
EndNote XML
Challenges to Human Factor for Advance Persistent Threats Proactive Identification in Modern Social Networks
Minchev, Zlatogor
.
"
Challenges to Human Factor for Advance Persistent Threats Proactive Identification in Modern Social Networks
."
Information & Security: An International Journal
34, no. 2 (2016): 123-136.
3405_minchev_id_ipts_in_social_networks.pdf
— Downloaded 3216 times
Read more
about Challenges to Human Factor for Advance Persistent Threats Proactive Identification in Modern Social Networks
20370 reads
Google Scholar
DOI
RTF
EndNote XML
Search form
Search
Information & Security journal
I&S Volumes
Policy
Editorial Board
Active Calls
Copyright & Licensing
Indexing & Archiving
Submit a paper
Books & Papers
Top downloads
Previews
On Inequalities Bounding Imprecision and Nonspecificity Measures of Uncertainty
On the Effectiveness of Measures of Uncertainty of Basic Belief Assignments
Blockchain in Agriculture
Multi-UAV Mission Planning for Monitoring Critical Infrastructures Considering Failures and Cyberattacks
A Hybrid Intrusion Detection with Decision Tree for Feature Selection
European Conflict Analysis Project (ECAP)
Generalized Net Model of the Water Resources Assessment Process and Water Use Management
view all
News
26/08/2015
Closing the Call on National Case Studies in Organizing Cybersecurity
10/04/2015
CfP on Education & Training for Cybersecurity and Resilience
26/03/2015
CfP on Crisis Management Policies, Organisation and Capabilities
15/08/2014
EvoCS project webiste launched
31/07/2014
Call for Papers on Heart Failure and Stress Response
25/03/2015
Standing Call for Papers for the Biomedical Data Journal
07/04/2015
Call for Papers on Brain Disorders announced
31/03/2015
Call for Papers on High Throughput Drug Screening
07/01/2015
The Winter 2014 issue of Connections now online
03/04/2015
Call for Papers on Evolving Concepts of Security
view all