Skip to main content

Top downloads

Title Downloads

Scenarios in a Rational Approach towards Planning under Uncertainty

(178)

Context Scenarios in Long-Term Defense Planning

(207)

National Security Strategy of the Netherlands: An Innovative Approach

(199)

US Department of Defense Modeling and Simulation: New Approaches and Initiatives

(159)

The Challenge of Transforming Ukrainian Armed Forces: How Science Supports Armed Forces’ Development

(100)

Main Challenges for the Bulgarian Armed Forces Transformation

(133)

The Ministry of Defense Armed Forces Transformation Management Policy

(67)

Supporting Transformation

(80)

Air Force Transformation resources

(76)

Analysis of Alternatives: An Efficient Tool in Managing Force Modernization Projects

(83)

A Framework Methodology to Support the Selection of a Multipurpose Fighter

(183)

2020 Air Force Mission Capabilities Packages from Operational Analysis Perspective

(156)

Examining Air Power as a Component of State Power

(57)

Modernization of the Bulgarian Air Force and Interoperability with Allied Forces

(104)

Challenges for the Bulgarian Air Force - A Royal Air Force Perspective

(122)

A NATO Perspective on Challenges and Prospects for the Bulgarian Air Force

(72)

Bulgarian Air Force - Challenges and Prospects

(79)

Challenges of Air Force Transformation

(86)

Applying the System Approach to the Study of Critical Infrastructure

(102)

Computer Aided Dispatch – A Tool for Effect-Based Multinational and Interagency Operations

(83)

An Alternative of the System Approach to Functional Aspects Analysis of the Maritime Crisis Management System

(221)

Modeling Support to Battlespace Awareness

(59)

Dependable Computing Systems in Support of Transformation of the Force Information Infrastructure

(138)

On Simulation-based Wargaming: Comparison of Two Different Methodological Approaches

(189)

Ontologies and Semantic Web Technologies to Support Knowledge-Based Transformation and Decision Support

(78)

Planning Measures and Capabilities for Protection of Critical Infrastructures

(142)

Cognitive Approach to Modeling Reflexive Control in Socio-Economic Systems

(228)

Is it Apprpopriate to Use the Objective, Rational Decision- Making Framework as a Foundation for Modelling Social Systems?

(126)

CAX, Joint Training and Transformation Objectives

(148)

Supporting Transformation

(88)

Counterterrorism Related Internet Sources

(61)

Information Technology and Terrorism: The Impact of Emerging Commercial Capabilities

(61)

Terrorism on the Sea, Piracy, and Maritime Security

(218)

Special Operations Forces in the Fight Against Terrorism on National Territory

(167)

Does NATO Have a Role in the Fight Against International Terrorism Analysis of NATO's Response to September 11

(78)

Research and Development of an Iris-based Recognition System for Identification and Secure Authentication

(155)

Building a Sound and Flexible Emergency Response System Hard Won Lessons in Disaster Management

(222)

Terrorist ‘Use’ of the Internet and Fighting Back

(222)

Cybersecurity-Related Internet Sources

(77)

Managing Cybersecurity Resources: A Cost-Benefit Analysis

(95)

Advanced Information Technology and Terrorism

(76)

An Efficient and Secure Remote Authentication Scheme Using Smart Cards

(154)

Secure User-Friendly Remote Authentication Schemes

(88)

Security Protocols for Outsourcing Database Services

(81)

Choosing t-out-of-n Secrets by Oblivious Transfer

(80)

Credit Card Fraud Detection Using Self-Organizing Maps

(252)

Money Laundering Techniques with Electronic Payment Systems

(128)

Cybersecurity as a Relative Concept

(186)

Securing Cyberspace

(114)

I&S Resources

(68)