Skip to main content

Most read in past 36 months

Title Total views
Network Intrusion Detection: An Analyst’s Handbook 9
Governance on Intelligence: Issues that Play a Role 9
New Challenges to Information Security Caused by the Introduction of Wi-Fi Technologies 9
Developing and Employing Expeditionary Capabilities: Key to Transforming Air Forces of Small NATO Nations 9
An Efficient and Secure Remote Authentication Scheme Using Smart Cards 9
Bulgaria in NATO:New Roles and Capabilities of the Navy 9
Design of a Secure Fine-Grained Official Document Exchange Model for E-Government 9
E-Comerce Laboratory, Plovdiv University, Bulgaria 9
The Internet in China: Civilian and Military Uses 9
Contemporary Trends in the Development of Information Security and Computer Virology 9
The Information Revolution and Post-Modern Warfare 9
Advanced NATO-compatible Solutions for Surface Vessels 9
On the Necessity to Create a National Processing Centre 9
Needs and Opportunities for Enhancing the Emergency Management System 9
Two Secure Transportation Schemes for Mobile Agents 9
A Terrain Reasoning Algorithm for Defending a Fire Zone 9
The Design And Evaluation of Situation Assessment Strategies 9
Library Update 9
On Integrity of Intelligence in Countries of Eastern Europe 9
Obstacles in Inter-Organizational Cooperation and Hybrid Threats 9
Combat & Security Related Modeling and Simulation in Croatia 9
Risk as a Factor in Decision-Making 9
Plagiarism, Cheating and Academic Dishonesty – Have You Been There? 9
Defence Budget Transparency on the Internet 9
Intelligence for a safe city model 9
Reforming Intelligence Services In Mexico 9
Band Width Maximin Fair Optimization in Mesh Networks Based on Perceived Quality of Service 9
Identifying the Reasons for Failures in Large-Scale Systems 9
PRETTY (Private Telephony Security) - Securing the Private Telephony Infrastructure 9
New Financial Transaction Security Concerns in Mobile Commerce 9
Security Aspects of the Cellular Communications 9
Internet of Things – A New Attack Vector for Hybrid Threats 9
Choosing FMECA-Based Techniques and Tools for Safety Analysis of Critical Systems 9
The Ministry of Defense Armed Forces Transformation Management Policy 9
E-GOVERNMENT AND SECURITY OF INFORMATION INTERNET SOURCES 9
An Improved Version of a Multiple Target Tracking Algorithm 9
Kaleidoscopic Approach to Security Shadows in the Age of Information 9
Ubiquitous Insecurity? How to “Hack” IT Systems 9
The Growing Threat: Homeland Security Issues of Bulgaria 9
Advanced Distributed Learning and Community 9
A Secure Online Medical Information System in Distributed and Heterogeneous Computing Environment 9
On the Generalized Input Estimation 9
Modeling Support to Battlespace Awareness 9
Securing Cyberspace 9
Information Assurance Challenges 9
Editorial: Critical Infrastructures Safety and Security. Trends in the Context of Information Technology Development 8
Contribution of the New Main Combat Aircraft to Bulgaria’s Defence Capabilities 8
Analysis of the Reasons for Incidents with Radioactive Sources in Bulgaria and Preventive Measures 8
Advances in Modelling and Simulation 8
Reasoning and Object-Oriented Data Processing for Multisensor Data Fusion 8