Skip to main content

Most read in past 36 months

Title Total views
The Bulgarian Armed Forces in the Information Society 48
Interorganizational and International Cooperation and Coordination in Providing Security: Current Practice and Lessons Learned 47
Cryptographic Key Generation by Genetic Algorithms 47
Harnessing the Potential of AI Against Covid-19 through the Lens of Cybersecurity: Challenges, Tools, and Techniques 47
A Concept for Establishing a Security Operations and Training Centre at the Bulgarian Naval Academy 46
The Use of the Internet by Terrorist Organizations 46
Design of Technical Methods for Analysing Network Security Based on Identification of Network Traffic Anomalies 46
IMoViS: A System for Mobile Visualization of Intrusion Detection Data 45
Cyberterrorism and Turkey’s Counter-Cyberterrorism Efforts 45
Testbed of an Integrated Network Operations Center and a Security Operations Center Based on Open-Source Tools 44
An innovative Airport Physical-cyber Security System (APSS) 44
Use of a GIS System to Visualize the Levels of Risk in the Areas of Critical Infrastructure Objects 44
Multinational Cooperation and Intervention: Small Steps to Better Results 43
Cooperation Model for Establishing Secure Digital Transformation in Corporations: Overview of Regulatory Issues 43
Fostering a Comprehensive Security Approach: An Exploratory Case Study of CBRN Crisis Management Frameworks in Eleven European Countries 43
Context Scenarios in Long-Term Defense Planning 43
Seabed Critical Infrastructures 42
Transformation: Military and Science 42
Problems of Digitized Information Flow Analysis: Cognitive Aspects 42
A Scalable and Adaptable Asset-Based Cyber Risk Assessment Tool for All Types of Organisations 42
The Cyberwar Debate: Perception and Politics in US Critical Infrastructure Protection 42
Urban Area Geodynamic Risk Mapping Using Long-Term Time Series of Sentinel-1 Satellite Radar Interferometry 41
A Hybrid Bat-Grey Wolf Algorithm for Predicting Chronic Kidney Disease 41
Methodological Foundation of State’s Information Security in Social Networking Services in Conditions of Hybrid War 41
Hybrid Warfare and Societal Resilience: Implications for Democratic Governance 40
Quantum-Based Solutions for the Next-Generation Internet 40
Distance Learning at the Nikola Vaptsarov Naval Academy Utilising Online Platforms during the COVID-19 Crisis 40
Cybersecurity in Ukraine: Problems and Perspectives 40
Generalized Net Model of Possible Drone’s Communication Control Cyber Theft with Intuitionistic Fuzzy Estimations 40
Prospects for Improvement in Peacebuilding: The Choice for Cooperation and Coordination 39
21st Century Cyber Warfare 39
Money Laundering Techniques with Electronic Payment Systems 38
Stakeholder Engagement Framework 38
Creating and Strengthening Cybersecurity in the Republic of Moldova 37
ICT Governance, Human Factors and Cyber Situational Awareness 37
Critical Information Infrastructure Protection (CIIP) 37
The Impact of the MSDF Technologies on the Information Space Structure Reordering and Evolution 37
IT-related Challenges Facing the Bulgarian Armed Forces and Their Performance Related Impact 36
Aligning Ukrainian Concepts and Standards in Defence, Safety, and Cybersecurity to NATO and EU Developments 36
Building Societal Resilience against Hybrid Threats 36
Foundations for a new theory of plausible and paradoxical reasoning 35
Challenges to Human Factor for Advance Persistent Threats Proactive Identification in Modern Social Networks 35
Institution Building for It Governance and Management 35
Prerequisites and Approaches to Force Modernization in a Transition Period 35
Cybersecurity Innovation in NATO: Lessons Learned and Recommendations 35
Organising for IT Effectiveness, Efficiency and Cyber Resilience in the Academic Sector: National and Regional Dimensions 34
Cognitive Approach to Modeling Reflexive Control in Socio-Economic Systems 34
Possibilities for Using Unmanned Aerial Vehicles to Obtain Sensory Information for Environmental Analysis 34
Cyber Security and Resilience of Modern Societies: A Research Management Architecture 34
Tactical Approach to Cyber Defence in IoT Computer Networks 33