Skip to main content
Procon Ltd. Information & Security: An International Journal
About
Business areas
Business Process
Business Intelligence
Knowledge Dissemination
Studies
Publishing
Partners
News
Books & Papers
Books
Authors
Keywords
You are here
Home
»
Information & knowledge management
»
Information management
Information management
Information management
Information management
3D Facial Reconstruction from 2D Portrait Imagery
Caruana, Matthew
, and
Joseph G. Vella
.
"
3D Facial Reconstruction from 2D Portrait Imagery
."
Information & Security: An International Journal
47, no. 3 (2020): 328-340.
4724_3d_facial_reconstruction.pdf
— Downloaded 3017 times
Read more
about 3D Facial Reconstruction from 2D Portrait Imagery
9330 reads
Google Scholar
DOI
RTF
EndNote XML
Aspect Level Sentiment Analysis Methods Applied to Text in Formal Military Reports
Mestric, Ivana Ilic
,
Arvid Kok
,
Giavid Valiyev
,
Michael Street
, and
Peter Lenk
.
"
Aspect Level Sentiment Analysis Methods Applied to Text in Formal Military Reports
."
Information & Security: An International Journal
46, no. 3 (2020): 227-238.
4616_sentiment_analysis.pdf
— Downloaded 3265 times
Read more
about Aspect Level Sentiment Analysis Methods Applied to Text in Formal Military Reports
6857 reads
Google Scholar
DOI
RTF
EndNote XML
Model Fooling Attacks Against Medical Imaging: A Short Survey
Sipola, Tuomo
,
Samir Puuska
, and
Tero Kokkonen
.
"
Model Fooling Attacks Against Medical Imaging: A Short Survey
."
Information & Security: An International Journal
46, no. 2 (2020): 215-224.
4615_fooling_attacks_medical.pdf
— Downloaded 2850 times
Read more
about Model Fooling Attacks Against Medical Imaging: A Short Survey
10414 reads
Google Scholar
DOI
RTF
EndNote XML
Integration of Information Resources to Ensure Collaboration in Crisis Management
Ignatova, Kristina
, and
Dimitar Tsonev
.
"
Integration of Information Resources to Ensure Collaboration in Crisis Management
."
Information & Security: An International Journal
46, no. 2 (2020): 141-152.
4610_information_resources_collaboration.pdf
— Downloaded 2701 times
Read more
about Integration of Information Resources to Ensure Collaboration in Crisis Management
7533 reads
Google Scholar
DOI
RTF
EndNote XML
Signature-based Intrusion Detection Hardware-Software Complex
Stetsenko, Inna V.
, and
Maksym Demydenko
.
"
Signature-based Intrusion Detection Hardware-Software Complex
."
Information & Security: An International Journal
47, no. 2 (2020): 221-231.
4715_signature-based_ids.pdf
— Downloaded 3869 times
Read more
about Signature-based Intrusion Detection Hardware-Software Complex
7291 reads
Google Scholar
DOI
RTF
EndNote XML
Adopting Machine Learning for Images Transferred with LoRaWAN
Brazhenenko, Maksym
,
Victor Shevchenko
,
Oleksiy Bychkov
,
Boyan Jekov
,
Pepa Petrova
, and
Eugenia Kovatcheva
.
"
Adopting Machine Learning for Images Transferred with LoRaWAN
."
Information & Security: An International Journal
47, no. 2 (2020): 172-186.
4712_adopting_machine_learning_for_images.pdf
— Downloaded 2936 times
Read more
about Adopting Machine Learning for Images Transferred with LoRaWAN
6413 reads
Google Scholar
DOI
RTF
EndNote XML
Resilience Management Framework for Critical Information Infrastructure: Designing the Level of Trust that Encourages the Exchange of Health Data
Rajamäki, Jyri
.
"
Resilience Management Framework for Critical Information Infrastructure: Designing the Level of Trust that Encourages the Exchange of Health Data
."
Information & Security: An International Journal
47, no. 1 (2020): 91-108.
4706_trust_health_data_exchange.pdf
— Downloaded 3162 times
Read more
about Resilience Management Framework for Critical Information Infrastructure: Designing the Level of Trust that Encourages the Exchange of Health Data
10659 reads
Google Scholar
DOI
RTF
EndNote XML
A System for Analysis of Big Data from Social Media
Lande, Dmytro
,
Igor Subach
, and
Alexander Puchkov
.
"
A System for Analysis of Big Data from Social Media
."
Information & Security: An International Journal
47, no. 1 (2020): 44-61.
4703_big_data_social_media.pdf
— Downloaded 3918 times
Read more
about A System for Analysis of Big Data from Social Media
8662 reads
Google Scholar
DOI
RTF
EndNote XML
The System of Operative Determination of the Level of Tension in Society Based on Data from Social Networks
Shchoholiev, Maksym
, and
Violeta Tretynyk
.
"
The System of Operative Determination of the Level of Tension in Society Based on Data from Social Networks
."
Information & Security: An International Journal
43, no. 3 (2019): 375-382.
4328_tension_in_society_social_networks.pdf
— Downloaded 3239 times
Read more
about The System of Operative Determination of the Level of Tension in Society Based on Data from Social Networks
9633 reads
Google Scholar
DOI
RTF
EndNote XML
Cyber Situational Awareness and Information Sharing in Critical Infrastructure Organizations
Pöyhönen, Jouni
,
Viivi Nuojua
,
Martti Lehto
, and
Jyri Rajamäki
.
"
Cyber Situational Awareness and Information Sharing in Critical Infrastructure Organizations
."
Information & Security: An International Journal
43, no. 2 (2019): 236-256.
4318_cyber_in_critical_infrastructure_organizations.pdf
— Downloaded 3904 times
Read more
about Cyber Situational Awareness and Information Sharing in Critical Infrastructure Organizations
11772 reads
Google Scholar
DOI
RTF
EndNote XML
Pages
1
2
next ›
last »
Search form
Search
Information & Security journal
I&S Volumes
Policy
Editorial Board
Active Calls
Copyright & Licensing
Indexing & Archiving
Submit a paper
Books & Papers
Top downloads
Previews
On Inequalities Bounding Imprecision and Nonspecificity Measures of Uncertainty
On the Effectiveness of Measures of Uncertainty of Basic Belief Assignments
Blockchain in Agriculture
Multi-UAV Mission Planning for Monitoring Critical Infrastructures Considering Failures and Cyberattacks
A Hybrid Intrusion Detection with Decision Tree for Feature Selection
European Conflict Analysis Project (ECAP)
Generalized Net Model of the Water Resources Assessment Process and Water Use Management
view all
News
14/08/2020
Nanotechnology and Global Security
14/08/2020
Nanotechnology and Global Security
13/08/2020
How Improved Attribution in Cyber Warfare Can Help De-Escalate Cyber Arms Race
13/08/2020
Hybrid War: High-tech, Information and Cyber Conflicts
13/08/2020
The Age of Post-Truth: State Influence and Strategic Communication - Contemporary Security Challenges on Europe’s Eastern Flank:
11/08/2020
How Improved Attribution in Cyber Warfare Can Help De-Escalate Cyber Arms Race
10/08/2020
Social Media accounts
10/07/2020
The Winter 2020 issue of Connections
10/10/2018
The Summer-Fall 2018 issue of Connections
10/04/2018
The Winter 2018 issue of Connections
view all