Skip to main content

Most read in past 36 months

Title Total views
C4ISR in Navy Transformation Role, Joint Research and Advanced Technology Demonstrations 47
The Use of the Internet by Terrorist Organizations 46
Cyberterrorism and Turkey’s Counter-Cyberterrorism Efforts 45
Design of Technical Methods for Analysing Network Security Based on Identification of Network Traffic Anomalies 45
Managing Cybersecurity Resources: A Cost-Benefit Analysis 45
Cryptographic Key Generation by Genetic Algorithms 45
IMoViS: A System for Mobile Visualization of Intrusion Detection Data 44
Context Scenarios in Long-Term Defense Planning 43
Use of a GIS System to Visualize the Levels of Risk in the Areas of Critical Infrastructure Objects 43
Multinational Cooperation and Intervention: Small Steps to Better Results 43
Testbed of an Integrated Network Operations Center and a Security Operations Center Based on Open-Source Tools 43
Fostering a Comprehensive Security Approach: An Exploratory Case Study of CBRN Crisis Management Frameworks in Eleven European Countries 43
A Concept for Establishing a Security Operations and Training Centre at the Bulgarian Naval Academy 43
Problems of Digitized Information Flow Analysis: Cognitive Aspects 42
The Cyberwar Debate: Perception and Politics in US Critical Infrastructure Protection 42
An innovative Airport Physical-cyber Security System (APSS) 42
Interorganizational and International Cooperation and Coordination in Providing Security: Current Practice and Lessons Learned 41
Transformation: Military and Science 41
Urban Area Geodynamic Risk Mapping Using Long-Term Time Series of Sentinel-1 Satellite Radar Interferometry 41
A Scalable and Adaptable Asset-Based Cyber Risk Assessment Tool for All Types of Organisations 40
Cybersecurity in Ukraine: Problems and Perspectives 40
Generalized Net Model of Possible Drone’s Communication Control Cyber Theft with Intuitionistic Fuzzy Estimations 40
Quantum-Based Solutions for the Next-Generation Internet 40
Seabed Critical Infrastructures 40
Distance Learning at the Nikola Vaptsarov Naval Academy Utilising Online Platforms during the COVID-19 Crisis 40
A Hybrid Bat-Grey Wolf Algorithm for Predicting Chronic Kidney Disease 39
21st Century Cyber Warfare 38
Money Laundering Techniques with Electronic Payment Systems 38
Hybrid Warfare and Societal Resilience: Implications for Democratic Governance 38
Prospects for Improvement in Peacebuilding: The Choice for Cooperation and Coordination 38
Critical Information Infrastructure Protection (CIIP) 37
The Impact of the MSDF Technologies on the Information Space Structure Reordering and Evolution 37
Creating and Strengthening Cybersecurity in the Republic of Moldova 37
ICT Governance, Human Factors and Cyber Situational Awareness 37
Stakeholder Engagement Framework 36
IT-related Challenges Facing the Bulgarian Armed Forces and Their Performance Related Impact 36
Aligning Ukrainian Concepts and Standards in Defence, Safety, and Cybersecurity to NATO and EU Developments 36
Prerequisites and Approaches to Force Modernization in a Transition Period 35
Foundations for a new theory of plausible and paradoxical reasoning 35
Institution Building for It Governance and Management 35
Cybersecurity Innovation in NATO: Lessons Learned and Recommendations 34
Cyber Security and Resilience of Modern Societies: A Research Management Architecture 34
Organising for IT Effectiveness, Efficiency and Cyber Resilience in the Academic Sector: National and Regional Dimensions 34
Cognitive Approach to Modeling Reflexive Control in Socio-Economic Systems 34
Exploring the Role of the Human Factor in Cybersecurity: Results from an Expert Survey in Bulgaria 33
'FOCUS': Foresight Security Scenarios to Plan for Research to Support the 'EU 2035' as a Comprehensive Security Provider 33
Tactical Approach to Cyber Defence in IoT Computer Networks 33
Possibilities for Using Unmanned Aerial Vehicles to Obtain Sensory Information for Environmental Analysis 33
Building Societal Resilience against Hybrid Threats 32
Methodological Foundation of State’s Information Security in Social Networking Services in Conditions of Hybrid War 32