Skip to main content

Top downloads

Title Sort descending Downloads

(6)

(11)

(17)

(13)

(10)

(646)

(12)

(7)

(10)

(17)

(3)

"Cuius Regio, Eius Religio, Omnium Spatium?” State Sovereignty in the Age of the Internet

(241)

'FOCUS': Foresight Security Scenarios to Plan for Research to Support the 'EU 2035' as a Comprehensive Security Provider

(171)

'FOCUS': Foresight Security Scenarios to Plan for Research to Support the 'EU 2035' as a Comprehensive Security Provider

(215)

2020 Air Force Mission Capabilities Packages from Operational Analysis Perspective

(156)

2020 Transatlantic Security Jam: Resilience Going Forward

(207)

21st Century Cyber Warfare

(312)

3D Facial Reconstruction from 2D Portrait Imagery

(176)

A 3D Approach to Security and Development

(22)

A Balanced Scorecard for Managing the National Service for Protection

(30)

A Brief on Embedded Societal Security

(161)

A BTC-Based Watermarking Scheme for Digital Images

(171)

A Call for Holistic Approach to Defence Transparency in South East Europe

(63)

A Changing Security Paradigm. New Roles for New Actors – The Russian Approach

(90)

A Clustering Method for Information Summarization and Modelling a Subject Domain

(304)

A Comprehensive Approach to Cyber Security –Trends, Challenges and the Way Forward

(67)

A Comprehensive Approach to Modern Conflict: Afghanistan and Beyond

(34)

A Comprehensive Approach to Modern Conflict: Afghanistan and Beyond

(84)

A Concept for Establishing a Security Operations and Training Centre at the Bulgarian Naval Academy

(263)

A Concept of Zones of National Security Interests

(25)

A Conceptual Model for Resilience in the field of Secuirty

(160)

A Cost-Effective Approach to Securing Systems through Partial Decentralization

(275)

A Critical Analysis of the U.S. “Pivot” toward the Asia-Pacific: How Realistic is Neo-realism?

(97)

A Cultural Approach to the Southern Mediterranean Crisis

(30)

A Cyber Range for Armed Forces Education

(286)

A Digital Twin for the Logistics System of a Manufacturing Enterprise Using Industrial IoT

(187)

A Euro Border Guard and Hybrid Warfare. An Art Theft Perspective: Human Dimensions and a Moral Imperative

(61)

A Framework Methodology to Support the Selection of a Multipurpose Fighter

(183)

A Game Theory Application of the Rational Actor Model to the Russo-Georgian War of August 2008

(61)

A Gaming Approach to Enhancing Defense Resource Allocation

(53)

A Generalization of the Classic Combination Rules to DSm Hyper-power Sets

(116)

A Generic Reference Curriculum on Cybersecurity

(175)

A Governance Model for an EU Cyber Security Collaborative Network – ECSCON

(449)

A Governance Model of a Collaborative Networked Organization for Cybersecurity Research

(290)

A Human Rights and Ethical Lens on Security and Human Dignity: The Case Study of Syrian Asylum Seekers

(137)

A Hybrid Intrusion Detection with Decision Tree for Feature Selection

(274)

A License Plate Recognition System in e-Government

(161)

A Logical Model for Multi-Sector Cyber Risk Management

(437)

A Look Back at NATO’s 1999 Kosovo Campaign: A Questionably "Legal" but Justifiable Exception?

(64)

A MATLAB Tool for Development and Testing of Track Initiation and Multiple Target Tracking Algorithms

(167)