Skip to main content
Procon Ltd. Information & Security: An International Journal
About
Business areas
Business Process
Business Intelligence
Knowledge Dissemination
Studies
Publishing
Partners
News
Books & Papers
Books
Authors
Keywords
You are here
Home
»
Cybersecurity
»
Education & Training
Education & Training
Education & Training
Education & Training, Cyber exercises
Hybrid War: High-tech, Information and Cyber Conflicts
Danyk, Yuriy
,
Tamara Maliarchuk
, and
Chad Briggs
.
"
Hybrid War: High-tech, Information and Cyber Conflicts
."
Connections: The Quarterly Journal
16, no. 2 (2017): 5-24.
Danyk, Hybrid war
— Downloaded 7157 times
Read more
about Hybrid War: High-tech, Information and Cyber Conflicts
54615 reads
Google Scholar
DOI
RTF
EndNote XML
Cybersecurity: A Generic Reference Curriculum
Costigan, Sean S.
,
Michael A. Hennessy
,
Scott Knight
,
Dinos Kerigan-Kyrou
,
Philip Lark
,
Chris Pallaris
,
Daniel Peder Bagge
,
Gigi Roman
,
Natalia Spinu
,
Todor Tagarev
et al.
Cybersecurity: A Generic Reference Curriculum
. Kingston, ON: National Defence, 2016.
Read more
about Cybersecurity: A Generic Reference Curriculum
14990 reads
Google Scholar
RTF
EndNote XML
A Generic Reference Curriculum on Cybersecurity
Tagarev, Todor
.
"
A Generic Reference Curriculum on Cybersecurity
."
Information & Security: An International Journal
35, no. 2 (2016): 181-184.
Cybersecurity Reference Curriculum
— Downloaded 4685 times
Read more
about A Generic Reference Curriculum on Cybersecurity
15021 reads
Google Scholar
DOI
RTF
EndNote XML
Smart Grid Safety and Security: Educational and Research Activities
Brezhniev, Eugene
, and
Vyacheslav Kharchenko
.
"
Smart Grid Safety and Security: Educational and Research Activities
."
Information & Security: An International Journal
35, no. 2 (2016): 165-178.
Smart GRID Safety and Security
— Downloaded 4815 times
Read more
about Smart Grid Safety and Security: Educational and Research Activities
13235 reads
Google Scholar
DOI
RTF
EndNote XML
Integrating Cisco Systems’ Educational Programs in ICT Security Academic Curricula
Gordieiev, Oleksandr
,
Taras Lobur
, and
Ruslan Kozak
.
"
Integrating Cisco Systems’ Educational Programs in ICT Security Academic Curricula
."
Information & Security: An International Journal
35, no. 2 (2016): 151-163.
Cisco in ICT Security Academic Curricula
— Downloaded 4566 times
Read more
about Integrating Cisco Systems’ Educational Programs in ICT Security Academic Curricula
12398 reads
Google Scholar
DOI
RTF
EndNote XML
Formal and Intelligent Methods for Security and Resilience: Education and Training Issues
Pomorova, Oksana
, and
Sergii Lysenko
.
"
Formal and Intelligent Methods for Security and Resilience: Education and Training Issues
."
Information & Security: An International Journal
35, no. 2 (2016): 133-150.
Formal and Intelligent Methods
— Downloaded 4258 times
Read more
about Formal and Intelligent Methods for Security and Resilience: Education and Training Issues
13532 reads
Google Scholar
DOI
RTF
EndNote XML
An Experience Report on Education and Training Programme in Cybersecurity of Critical Infrastructures
Skarga-Bandurova, Inna
,
Alexandr Ryazantsev
, and
Katerina Kiryushatova
.
"
An Experience Report on Education and Training Programme in Cybersecurity of Critical Infrastructures
."
Information & Security: An International Journal
35, no. 2 (2016): 123-132.
Cyber Security of Critical Infrastructures
— Downloaded 5907 times
Read more
about An Experience Report on Education and Training Programme in Cybersecurity of Critical Infrastructures
13888 reads
Google Scholar
DOI
RTF
EndNote XML
Imeca-Based Technique for Security Assessment of Private Communications: Technology and Training
Androulidakis, Iosif
,
Vyacheslav Kharchenko
, and
Andriy Kovalenko
.
"
Imeca-Based Technique for Security Assessment of Private Communications: Technology and Training
."
Information & Security: An International Journal
35, no. 1 (2016): 99-120.
IMECA-private communications-training
— Downloaded 4725 times
Read more
about Imeca-Based Technique for Security Assessment of Private Communications: Technology and Training
12938 reads
Google Scholar
DOI
RTF
EndNote XML
Development of Tools for Practical Research on Cybersecurity in Msc Theses
Zhukovyts’kyy, Igor
, and
Denis Ostapec
.
"
Development of Tools for Practical Research on Cybersecurity in Msc Theses
."
Information & Security: An International Journal
35, no. 1 (2016): 81-97.
Cyber research MSc thesis
— Downloaded 4256 times
Read more
about Development of Tools for Practical Research on Cybersecurity in Msc Theses
14995 reads
Google Scholar
DOI
RTF
EndNote XML
Cyber Security Teaching and Learning Laboratories: A Survey
Topham, Luke
,
Kashif Kifayat
,
Younis A. Younis
,
Qi Shi
, and
Bob Askwith
.
"
Cyber Security Teaching and Learning Laboratories: A Survey
."
Information & Security: An International Journal
35, no. 1 (2016): 51-80.
Cyber Laboratory Survey
— Downloaded 6147 times
Read more
about Cyber Security Teaching and Learning Laboratories: A Survey
17335 reads
Google Scholar
DOI
RTF
EndNote XML
Pages
« first
‹ previous
1
2
3
next ›
last »
Search form
Search
Information & Security journal
I&S Volumes
Policy
Editorial Board
Active Calls
Copyright & Licensing
Indexing & Archiving
Submit a paper
Books & Papers
Top downloads
Previews
On Inequalities Bounding Imprecision and Nonspecificity Measures of Uncertainty
On the Effectiveness of Measures of Uncertainty of Basic Belief Assignments
Blockchain in Agriculture
Multi-UAV Mission Planning for Monitoring Critical Infrastructures Considering Failures and Cyberattacks
A Hybrid Intrusion Detection with Decision Tree for Feature Selection
European Conflict Analysis Project (ECAP)
Generalized Net Model of the Water Resources Assessment Process and Water Use Management
view all
News
14/08/2020
Nanotechnology and Global Security
14/08/2020
Nanotechnology and Global Security
13/08/2020
How Improved Attribution in Cyber Warfare Can Help De-Escalate Cyber Arms Race
13/08/2020
Hybrid War: High-tech, Information and Cyber Conflicts
13/08/2020
The Age of Post-Truth: State Influence and Strategic Communication - Contemporary Security Challenges on Europe’s Eastern Flank:
11/08/2020
How Improved Attribution in Cyber Warfare Can Help De-Escalate Cyber Arms Race
10/08/2020
Social Media accounts
10/07/2020
The Winter 2020 issue of Connections
10/10/2018
The Summer-Fall 2018 issue of Connections
10/04/2018
The Winter 2018 issue of Connections
view all