Skip to main content

Top downloads

Title Downloads

Creating and Strengthening Cybersecurity in the Republic of Moldova

(248)

Cybersecurity in Ukraine: Problems and Perspectives

(199)

Trusted Networks Initiative: The Netherlands’ Response to DDoS Attacks

(270)

Cyberterrorism and Turkey’s Counter-Cyberterrorism Efforts

(258)

French Cyber Security and Defence: An Overview

(426)

Organising National Cybersecurity Centres

(226)

Inductive Discovery of Criminal Group Structure Using Spectral Embedding

(277)

Legal Considerations of Intelligence Operations in Countering Transnational Organised Crime

(163)

A Robust Remote User Authentication Scheme using Smart Card

(70)

Biometric Template Security Using Code Base Cryptosystem

(152)

Intelligence Services of the Czech Republic: Current Legal Status and Its Development

(192)

On Integrity of Intelligence in Countries of Eastern Europe

(118)

Governance on Intelligence: Issues that Play a Role

(157)

Should the Intelligence Agencies ‘Show More Leg’ or Have They Just Been Stripped Naked?

(150)

Towards Europe 2035: In Search of the Archimedean Screw. FOCUS in Perspective

(133)

Referencing the Future: The EU’s Projected Security Roles and Their R&D Implications

(133)

Scenario Space for Alternative Futures of Security Research

(167)

Supply Chain Cyber Security – Potential Threats

(251)

TEMPUS-SAFEGUARD: National Safety IT-Engineering Network of Centres of Innovative Academia-Industry Handshaking

(99)

Methods of Assuring the Functional Safety of Aircraft On-Board Instrumentation&Control Systems in Their Life Cycle

(117)

Model and Implementation of Safety Case Cores

(117)

Choosing FMECA-Based Techniques and Tools for Safety Analysis of Critical Systems

(85)

On the Necessity to Create a National Processing Centre

(116)

Identifying the Reasons for Failures in Large-Scale Systems

(75)

Formal Verification of Nuclear Systems: Past, Present, and Future

(145)

Cloud Testing: A State-of-the-Art Review

(92)

An Approach for Assessing Risk of Common Cause Failures in Critical Infrastructures

(126)

A Study of Orbital Carrier Rocket and Spacecraft Failures: 2000-2009

(149)

Overview of Fine Exact Methods of Safety Engineering

(334)

Intrusion-Avoidance via System Diversity

(165)

Use of Mobile Applications in Security and Safety Systems

(155)

Band Width Maximin Fair Optimization in Mesh Networks Based on Perceived Quality of Service

(123)

Software for Computer Systems Trojans Detection as a Safety-Case Tool

(110)

A Method of Evaluating Assurance Requirements

(140)

Cyber Security of Safety-Critical Infrastructures: A Case Study for Nuclear Facilities

(96)

PRETTY (Private Telephony Security) - Securing the Private Telephony Infrastructure

(122)

Establishing an Air Pollution Monitoring Network for Industrial Regions: A Probabilistic Approach

(164)

Formalizing Power Grid Influence to Assess the Safety of Nuclear Power Plants

(98)

The State Corporate Cloud Computing- Based Network for Registration of Potentially Dangerous Objects

(145)

Management of Critical Infrastructures Based on Technical Megastate

(140)

Principles of Mitigating and Managing Human System Risks

(245)

Analytical Support to Critical Infrastructure Protection Policy and Investment Decision-Making

(120)

Editorial: Critical Infrastructures Safety and Security. Trends in the Context of Information Technology Development

(75)

MSA System Concept for Mediterranean Sea Surveillance

(164)

Challenges of Multinational Acquisition of Capabilities in Black Sea Format

(138)

Maritime Defence Investment Policy of the Republic of Bulgaria

(203)

Computer Assisted Exercises Management Environment for Civil Security

(92)

Distributed Training, CAX and Experimentation in support of Crisis Management

(126)

Decision Support Tools for Domestic Security Operations

(183)

Language Assistance to Multinational Partners in Coalition Operations

(81)