Information & Security: An International Journal最新文献

筛选
英文 中文
Towards a Robust and Scalable Cyber Range Federation for Sectoral Cyber/Hybrid Exercising: The Red Ranger and ECHO Collaborative Experience 面向部门网络/混合演习的强大和可扩展的网络范围联盟:红色游侠和ECHO合作经验
Information & Security: An International Journal Pub Date : 1900-01-01 DOI: 10.11610/isij.5319
George Sharkov, Christina T odorova, Georgi Koykov, I. Nikolov
{"title":"Towards a Robust and Scalable Cyber Range Federation for Sectoral Cyber/Hybrid Exercising: The Red Ranger and ECHO Collaborative Experience","authors":"George Sharkov, Christina T odorova, Georgi Koykov, I. Nikolov","doi":"10.11610/isij.5319","DOIUrl":"https://doi.org/10.11610/isij.5319","url":null,"abstract":"","PeriodicalId":414780,"journal":{"name":"Information & Security: An International Journal","volume":"69 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131163897","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Perspectives in the Design of a Modern Cybersecurity Training Programme: The ECHO Approach 现代网络安全培训计划设计的视角:ECHO方法
Information & Security: An International Journal Pub Date : 1900-01-01 DOI: 10.11610/isij.5312
P. Varbanov
{"title":"Perspectives in the Design of a Modern Cybersecurity Training Programme: The ECHO Approach","authors":"P. Varbanov","doi":"10.11610/isij.5312","DOIUrl":"https://doi.org/10.11610/isij.5312","url":null,"abstract":"","PeriodicalId":414780,"journal":{"name":"Information & Security: An International Journal","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128264553","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Governance Consulting Services and Tools: Governance Model Design for Collaborative Networked Organisations in the Cyber Domain 治理咨询服务和工具:网络领域协作网络化组织的治理模型设计
Information & Security: An International Journal Pub Date : 1900-01-01 DOI: 10.11610/isij.5310
Georgi Penchev, Velizar Shalamanov
{"title":"Governance Consulting Services and Tools: Governance Model Design for Collaborative Networked Organisations in the Cyber Domain","authors":"Georgi Penchev, Velizar Shalamanov","doi":"10.11610/isij.5310","DOIUrl":"https://doi.org/10.11610/isij.5310","url":null,"abstract":"","PeriodicalId":414780,"journal":{"name":"Information & Security: An International Journal","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121811198","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Garbled Circuits: Optimizations and Implementations 乱码电路:优化和实现
Information & Security: An International Journal Pub Date : 1900-01-01 DOI: 10.11610/isij.3701
Abdullatif Shikfa
{"title":"Garbled Circuits: Optimizations and Implementations","authors":"Abdullatif Shikfa","doi":"10.11610/isij.3701","DOIUrl":"https://doi.org/10.11610/isij.3701","url":null,"abstract":"","PeriodicalId":414780,"journal":{"name":"Information & Security: An International Journal","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130043040","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cyber Hygiene Issues in the Naval Security Environment 海军安全环境中的网络卫生问题
Information & Security: An International Journal Pub Date : 1900-01-01 DOI: 10.11610/isij.5314
B. Mednikarov
{"title":"Cyber Hygiene Issues in the Naval Security Environment","authors":"B. Mednikarov","doi":"10.11610/isij.5314","DOIUrl":"https://doi.org/10.11610/isij.5314","url":null,"abstract":"","PeriodicalId":414780,"journal":{"name":"Information & Security: An International Journal","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133509718","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
From Cryptology to Cyber Resilience – Bridging Theory and Practice 从密码学到网络弹性-连接理论与实践
Information & Security: An International Journal Pub Date : 1900-01-01 DOI: 10.11610/isij.3700
George Sharkov
{"title":"From Cryptology to Cyber Resilience – Bridging Theory and Practice","authors":"George Sharkov","doi":"10.11610/isij.3700","DOIUrl":"https://doi.org/10.11610/isij.3700","url":null,"abstract":"","PeriodicalId":414780,"journal":{"name":"Information & Security: An International Journal","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114651229","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Governance Mesh Approach for Cybersecurity Ecosystem 网络安全生态系统的治理网格方法
Information & Security: An International Journal Pub Date : 1900-01-01 DOI: 10.11610/isij.5308
A. Pasic
{"title":"Governance Mesh Approach for Cybersecurity Ecosystem","authors":"A. Pasic","doi":"10.11610/isij.5308","DOIUrl":"https://doi.org/10.11610/isij.5308","url":null,"abstract":"","PeriodicalId":414780,"journal":{"name":"Information & Security: An International Journal","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123209609","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Attacking a Leakage-Resilient Authenticated Encryption Scheme without Leakage 攻击无泄漏的防泄漏认证加密方案
Information & Security: An International Journal Pub Date : 1900-01-01 DOI: 10.11610/isij.3704
F. Abed, Francesco Berti, S. Lucks
{"title":"Attacking a Leakage-Resilient Authenticated Encryption Scheme without Leakage","authors":"F. Abed, Francesco Berti, S. Lucks","doi":"10.11610/isij.3704","DOIUrl":"https://doi.org/10.11610/isij.3704","url":null,"abstract":"","PeriodicalId":414780,"journal":{"name":"Information & Security: An International Journal","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129050504","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Phase changes in Meta-modelling using the Fractal Dimension 分形维数在元模型中的相变
Information & Security: An International Journal Pub Date : 1900-01-01 DOI: 10.11610/ISIJ.0802
James Moffat, S. Witty
{"title":"Phase changes in Meta-modelling using the Fractal Dimension","authors":"James Moffat, S. Witty","doi":"10.11610/ISIJ.0802","DOIUrl":"https://doi.org/10.11610/ISIJ.0802","url":null,"abstract":"In this paper we are concerned with intelligent agent simulation models which can be used to investigate some of the new aspects of “information-age” conflict. Such models consist of a number of agents which interact locally in order to produce global emergent behaviour. One of the simplest, yet very relevant, examples of such a model is ISAAC, developed by the US Marine Corps Combat Development Centre under the “Project Albert” initiative. 1,2 In this case, modification to the behavioural characteristics of the agents produces significantly different emergent behaviour in terms of the flow of battle and casualties suffered. Some of these behaviours can be surprising, and it is the aim of our work to produce a theory of such processes which helps to explain the types of behaviour to be expected.","PeriodicalId":414780,"journal":{"name":"Information & Security: An International Journal","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127194469","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
An Enhanced Solution for Automated Fire Control Systems 自动火控系统的增强解决方案
Information & Security: An International Journal Pub Date : 1900-01-01 DOI: 10.11610/isij.5307
Dilyan Markov, Alexander Kolev, Vania Ivanova
{"title":"An Enhanced Solution for Automated Fire Control Systems","authors":"Dilyan Markov, Alexander Kolev, Vania Ivanova","doi":"10.11610/isij.5307","DOIUrl":"https://doi.org/10.11610/isij.5307","url":null,"abstract":"","PeriodicalId":414780,"journal":{"name":"Information & Security: An International Journal","volume":"138 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126941978","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信