Skip to main content

Most read in past 36 months

Title Total views
Russian Reflexive Control Campaigns Targeting Political Realignment of Ukraine’s Democratic Allies: Critical Review and Conceptualization 817
The Need for Emotional Cues Analysis in OSINT in Countering Reflexive Control Information Warfare Campaigns: A Critical Review and Reconceptualization 789
Information Assurance Benefits and Challenges: An Introduction 642
Analysis of Cybersecurity Issues in the Maritime Industry 465
Cognitive Attacks in Russian Hybrid Warfare 426
Capture the Flag for Cyber-Resilience Exercising through Cryptographic Puzzles and Collaborative Problem-Solving 382
Blockchain and AI for the Next Generation Energy Grids: Cybersecurity Challenges and Opportunities 362
How to Support Teams to be Remote and Productive: Group Decision-Making for Distance Collaboration Software Tools 354
Interorganizational Cooperation in Supply Chain Cybersecurity: A Cross-Industry Study of the Effectiveness of the UK Implementation of the NIS Directive 290
Interorganizational Cooperation and the Fight against Terrorism in West Africa and the Sahel 275
OSINT on the Dark Web: Child Abuse Material Investigations 251
Security Analysis of Diceware Passphrases 235
NATO-EU Cooperation in Cybersecurity and Cyber Defence Offers Unrivalled Advantages 223
The Influence of Knowledge and Attitude on Intention to Adopt Cybersecure Behaviour 211
The Importance of the 1936 Montreux Convention for the Black Sea Security: A Close Look into Russia-NATO Controversy on the Russian-Ukrainian Conflict in 2022 209
Ethics of Cybersecurity and Biomedical Ethics: Case SHAPES 205
Utilising Experiential and Organizational Learning Theories to Improve Human Performance in Cyber Training 204
Capabilities-based Planning for Security Sector Transformation 202
Synthetic Data Generation for Fraud Detection Using Diffusion Models 199
Enhancing the Organisational Culture related to Cyber Security during the University Digital Transformation 186
AI-driven Cybersecurity Solutions, Cyber Ranges for Education & Training, and ICT Applications for Military Purposes 179
Host-based Intrusion Detection Using Signature-based and AI-driven Anomaly Detection Methods 177
A New Steganographic Algorithm for Hiding Messages in Music 175
Cyber Threat Prediction with Machine Learning 166
Credit Card Fraud Detection Using Self-Organizing Maps 159
A Logical Model for Multi-Sector Cyber Risk Management 157
Perspectives in the Design of a Modern Cybersecurity Training Programme: The ECHO Approach 154
Policy and Legal Frameworks of Using Armed Forces for Domestic Disaster Response and Relief 153
Legislation, Vulnerability and Disaster Risk Management of Waterborne Diseases in Zimbabwe 151
Challenges in a 2035 Perspective: Roles for the EU as a Global Security Provider? 151
CISE as a Tool for Sharing Sensitive Cyber Information in Maritime Domain 140
Defining the Concept of ‘Hybrid Warfare’ Based on the Analysis of Russia’s Aggression against Ukraine 138
Organizational Learning in the Academic Literature – Systematic Literature Review 136
A System-of-Systems Approach to Cyber Security and Resilience 136
Cyber Protection of Critical Infrastructures, Novel Big Data and Artificial Intelligence Solutions 129
Towards Unified European Cyber Incident and Crisis Management Ontology 128
Training as a Tool of Fostering CIP Concept Implementation: Results of a Table Top Exercise on Critical Energy Infrastructure Resilience 128
A Clustering Method for Information Summarization and Modelling a Subject Domain 126
Towards a Robust and Scalable Cyber Range Federation for Sectoral Cyber/Hybrid Exercising: The Red Ranger and ECHO Collaborative Experience 126
Data, Privacy and Human-Centered AI in Defense and Security Systems: Legal and Ethical Considerations 125
ECHO Early Warning System as a Preventive Tool against Cybercrime in the Energy Sector 124
Military Implications of the Nagorno-Karabakh Conflict: Tactics and Technologies 123
Evolving Models of Using Armed Forces in Domestic Disaster Response and Relief 120
Cybernetic Approach to Developing Resilient Systems: Concept, Models and Application 120
DIGILIENCE - A Platform for Digital Transformation, Cyber Security and Resilience 119
Public Key Generation Principles Impact Cybersecurity 119
The Importance of Open-Source Intelligence in Assessing Risks of Cyberattacks 119
Cyber Situational Awareness and Information Sharing in Critical Infrastructure Organizations 118
Governance Consulting Services and Tools: Governance Model Design for Collaborative Networked Organisations in the Cyber Domain 118
Public-Private Partnerships for Information Sharing in the Security Sector: What’s in It for Me? 117