Author(s):

George Sharkov; Yavor Papazov; Christina Todorova; Georgi Koykov; Georgi Zahariev

Keywords:

cyber threats, information security, cybersecurity, C2 and coordination, emerging technologies,

Author(s):

Todor Tagarev, Bríd Á. Davis

Keywords:

cybersecurity, collaborative networked organisation, business model, governance requirements, governance model, ECHO project

Author(s):

Kaie Maennel

Keywords:

cybersecurity, learning analytics, learning metrics, training, exercises

Author(s):

Yantsislav Yanakiev, Todor Tagarev

Keywords:

applied computing, enterprise computing, IT governance, Information systems, Information systems applications, Enterprise information systems, Social and professional topics

Author(s):

Constantinos Patsakis, Fran Casino, Nikolaos Lykousas, Vasilios Katos,

Keywords:

computer crime, cryptography, data privacy, internet, security concerns, emerging threat landscape, blockchain-based DNS

Author(s):

Maryna Kolisnyk, Vyacheslav Kharchenko, Iryna Piskachova

Keywords:

Industrial Internet of things, Cyberattacks, Dependability, , Availability function, Cybersecurity,

Author(s):

Todor Tagarev, Yantsislav Yanakiev

Keywords:

Industry 4.0, business model, collaborative networked organisations, CNOs, cybersecurity, taxonomy, ECHO project

Author(s):

Todor Tagarev

Keywords:

Industry 4.0, Industry 5.0, collaborative networked organisations, CNOs, network governance , cybersecurity , interviews , ECHO project

Author(s):

Miralem Mehic, Marcin Niemiec, Harun Siljak, Miroslav Voznak

Keywords:

error reconciliation, quantum key distribution, performances reversibility

Author(s):

Mohammed Al Qurashia, Constantinos Marios Angelopoulosa, Vasilios Katosa

Keywords:

ids, IoT, wireless sensor networks, rpl protocol, sinkhole attack

Author(s):

Nikolaos Serketzis, Vasilios Katos, Christos Ilioudis, Dimitrios Baltatzis, Georgios Pangalos

Keywords:

digital forensics, digital forensic readiness, threat intelligence, threat hunting

Author(s):

Todor Tagarev

Keywords:

cybersecurity competence network, collaborative networked organisation, network governance, requirements; prioritisation

Author(s):

K. Rantos, A. Spyros, A. Papanikolaou, A. Kritsas, C. Ilioudis, V. Katos

Keywords:

cyber threat information, cyber threat intelligence, interoperability, cybersecurity

Author(s):

Todor Tagarev; George Sharkov

Keywords:

agility, cybersecurity, distributed system,, high-performance computing, operations, policy, resilience, risk management

Author(s):

Todor Tagarev; Nikolai Stoianov; George Sharkov

Keywords:

bio-integrated systems, cyber security, cyber-physical system, decision making

Author(s):

Sergiy Dotsenko; Oleg Illiashenko; Sergii Kamenskyi; Vyacheslav Kharchenko

Keywords:

information security, information technologies, IT security, knowledge management, security standards

Author(s):

Sergiy Dotsenko; Oleg Illiashenko; Sergii Kamenskyi; Vyacheslav Kharchenko

Keywords:

control system, enterprise management system, industry 4.0, integrated security management system, safety,

Author(s):

Jouni Pöyhönen; Viivi Nuojua; Martti Lehto; Jyri Rajamäki

Keywords:

critical Infrastructure, cybersecurity, information sharing, situational awareness

Author(s):

Jyri Rajamäki; Ilkka Tikanmäki; Jari Räsänen

Keywords:

cybersecurity, early warning, echo project, information sharing, maritime surveillance, sharing sensitive cyber information

Author(s):

Jussi Simola

Keywords:

cooperation, early warnings, echo project, indicators, information sharing, situational awareness

Author(s):

Kirsi Aaltola; Petteri Taitto

Keywords:

cybersecurity, education and training, exercises, human factors, organizational learning

Author(s):

Marcin Niemiec; Andrzej Dziech; Miłosz Stypiński; Jan Derkacz

Keywords:

communications, next-generation Internet, quantum techniques,

Author(s):

Notis Mengidis; Theodora Tsikrika; Stefanos Vrochidis; Ioannis Kompatsiaris

Keywords:

AI, blockchain, cybersecurity, energy grid, smart contracts, smart grid

Author(s):

Todor Tagarev; George Sharkov; Nikolai Stoianov; Velizar Shalamanov

Keywords:

cybersecurity, resilience research management

Author(s):

Velizar Shalamanov; Georgi Penchev

Keywords:

cyber security, enterprise architecture, governance, IT security, management, modeling, network analysis, simulation