George Sharkov, Christina T odorova, Georgi Koykov, I. Nikolov
{"title":"Towards a Robust and Scalable Cyber Range Federation for Sectoral Cyber/Hybrid Exercising: The Red Ranger and ECHO Collaborative Experience","authors":"George Sharkov, Christina T odorova, Georgi Koykov, I. Nikolov","doi":"10.11610/isij.5319","DOIUrl":"https://doi.org/10.11610/isij.5319","url":null,"abstract":"","PeriodicalId":414780,"journal":{"name":"Information & Security: An International Journal","volume":"69 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131163897","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Perspectives in the Design of a Modern Cybersecurity Training Programme: The ECHO Approach","authors":"P. Varbanov","doi":"10.11610/isij.5312","DOIUrl":"https://doi.org/10.11610/isij.5312","url":null,"abstract":"","PeriodicalId":414780,"journal":{"name":"Information & Security: An International Journal","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128264553","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Governance Consulting Services and Tools: Governance Model Design for Collaborative Networked Organisations in the Cyber Domain","authors":"Georgi Penchev, Velizar Shalamanov","doi":"10.11610/isij.5310","DOIUrl":"https://doi.org/10.11610/isij.5310","url":null,"abstract":"","PeriodicalId":414780,"journal":{"name":"Information & Security: An International Journal","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121811198","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Garbled Circuits: Optimizations and Implementations","authors":"Abdullatif Shikfa","doi":"10.11610/isij.3701","DOIUrl":"https://doi.org/10.11610/isij.3701","url":null,"abstract":"","PeriodicalId":414780,"journal":{"name":"Information & Security: An International Journal","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130043040","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Cyber Hygiene Issues in the Naval Security Environment","authors":"B. Mednikarov","doi":"10.11610/isij.5314","DOIUrl":"https://doi.org/10.11610/isij.5314","url":null,"abstract":"","PeriodicalId":414780,"journal":{"name":"Information & Security: An International Journal","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133509718","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"From Cryptology to Cyber Resilience – Bridging Theory and Practice","authors":"George Sharkov","doi":"10.11610/isij.3700","DOIUrl":"https://doi.org/10.11610/isij.3700","url":null,"abstract":"","PeriodicalId":414780,"journal":{"name":"Information & Security: An International Journal","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114651229","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Governance Mesh Approach for Cybersecurity Ecosystem","authors":"A. Pasic","doi":"10.11610/isij.5308","DOIUrl":"https://doi.org/10.11610/isij.5308","url":null,"abstract":"","PeriodicalId":414780,"journal":{"name":"Information & Security: An International Journal","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123209609","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Attacking a Leakage-Resilient Authenticated Encryption Scheme without Leakage","authors":"F. Abed, Francesco Berti, S. Lucks","doi":"10.11610/isij.3704","DOIUrl":"https://doi.org/10.11610/isij.3704","url":null,"abstract":"","PeriodicalId":414780,"journal":{"name":"Information & Security: An International Journal","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129050504","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Phase changes in Meta-modelling using the Fractal Dimension","authors":"James Moffat, S. Witty","doi":"10.11610/ISIJ.0802","DOIUrl":"https://doi.org/10.11610/ISIJ.0802","url":null,"abstract":"In this paper we are concerned with intelligent agent simulation models which can be used to investigate some of the new aspects of “information-age” conflict. Such models consist of a number of agents which interact locally in order to produce global emergent behaviour. One of the simplest, yet very relevant, examples of such a model is ISAAC, developed by the US Marine Corps Combat Development Centre under the “Project Albert” initiative. 1,2 In this case, modification to the behavioural characteristics of the agents produces significantly different emergent behaviour in terms of the flow of battle and casualties suffered. Some of these behaviours can be surprising, and it is the aim of our work to produce a theory of such processes which helps to explain the types of behaviour to be expected.","PeriodicalId":414780,"journal":{"name":"Information & Security: An International Journal","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127194469","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Enhanced Solution for Automated Fire Control Systems","authors":"Dilyan Markov, Alexander Kolev, Vania Ivanova","doi":"10.11610/isij.5307","DOIUrl":"https://doi.org/10.11610/isij.5307","url":null,"abstract":"","PeriodicalId":414780,"journal":{"name":"Information & Security: An International Journal","volume":"138 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126941978","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}