Skip to main content

Most read in past 36 months

Title Total views
Security Sector Reform Wisdom for Cyber Security Institution Building: The Case of Serbia 19
Small Countries and Major Global Economic Players – the Nicaraguan Channel 19
Information Security: Management and Personnel Issues 19
A MATLAB Tool for Development and Testing of Track Initiation and Multiple Target Tracking Algorithms 18
Intelligence Services of the Czech Republic: Current Legal Status and Its Development 18
An IMMPDAF Solution to Benchmark Problem for Tracking in Clutter and Stand-off Jammer 18
Comprehensive Approach to Security Risk Management in Critical Infrastructures and Supply Chains 18
2020 Air Force Mission Capabilities Packages from Operational Analysis Perspective 18
Mine Hunting with Drones 18
A Robust Remote User Authentication Scheme using Smart Card 18
Towards Effective and Efficient IT Organizations with Enhanced Cyber Resilience 18
Challenges of Multinational Acquisition of Capabilities in Black Sea Format 18
US Department of Defense Modeling and Simulation: New Approaches and Initiatives 18
MSA System Concept for Mediterranean Sea Surveillance 18
Smart Grid Safety and Security: Educational and Research Activities 18
Cyber Security of Safety-Critical Infrastructures: A Case Study for Nuclear Facilities 18
TAS: Trust Assessment System 18
Does NATO Have a Role in the Fight Against International Terrorism Analysis of NATO's Response to September 11 17
A Means of Comparing Military Budgeting Processes in South East Europe 17
Inductive Discovery of Criminal Group Structure Using Spectral Embedding 17
An Experience Report on Education and Training Programme in Cybersecurity of Critical Infrastructures 17
The Persistent Need to Reform Cyber Security Services: A Case Study on France 17
DIGILIENCE 2019 Agenda and Abstracts 17
African Union-Led Peacekeeping Operations: Constraints and Opportunities of Interagency Cooperation in the Experience of Burundi and South Africa 17
C4ISR in Modernizing Security Sector in Bulgaria and South-Eastern Europe 17
Cyberwarriors: The Backbone of the Future Military or a Misnomer? 17
Assessing Comprehensive Security Approaches in Action: An Introduction 17
Fuzzy Control Based on Cluster Analysis and Dynamic Programming 17
Information warfare principles and operations 16
Telemedical Services for Disaster Emergencies 16
Formal Verification of Nuclear Systems: Past, Present, and Future 16
Information Technologies in the Command and Control System of the Gendarmerie 16
Tracking Filters for Radar Systems with Correlated Measurement Noise 16
Using Remote Sensing Methods to Refine the Landscape-Morphological Regionalization for the Territory Due to the Secondary Pollutant Redistribution Across Soil Cover 16
Towards Multi-National Capability Development in Cyber Defence 16
Human Expert Fusion for Image Classification 16
Maritime Defence Investment Policy of the Republic of Bulgaria 16
Comprehensive Security and Some Implemental Limits 16
Analysis of Alternatives: An Efficient Tool in Managing Force Modernization Projects 16
C4I System Reengineering: Essential Component of Bulgarian Armed Forces 16
Risks for the Population along the Bulgarian Black Sea Coast from Flooding Caused by Extreme Rise of Sea Level 16
Introduction to the Fusion of Quantitative and Qualitative Beliefs 16
The European Union Moves Ahead on Cybersecurity Research Through Enhanced Cooperation and Coordination 16
Towards Europe 2035: In Search of the Archimedean Screw. FOCUS in Perspective 15
Security Protocols for Outsourcing Database Services 15
TEMPUS-SAFEGUARD: National Safety IT-Engineering Network of Centres of Innovative Academia-Industry Handshaking 15
Modeling and Simulation in Defense 15
Intelligence, Crime and Cybersecurity 15
Reconciling Operational and Financial Planning Views in a Customer-Funded Organization: Making Customer-Funding Work for NC3A 15
Terrorism on the Sea, Piracy, and Maritime Security 15