Skip to main content

Most read in past 36 months

Title Sort descending Total views
"Cuius Regio, Eius Religio, Omnium Spatium?” State Sovereignty in the Age of the Internet 10
'FOCUS': Foresight Security Scenarios to Plan for Research to Support the 'EU 2035' as a Comprehensive Security Provider 32
2020 Air Force Mission Capabilities Packages from Operational Analysis Perspective 12
21st Century Cyber Warfare 23
3D Facial Reconstruction from 2D Portrait Imagery 38
A Brief on Embedded Societal Security 14
A BTC-Based Watermarking Scheme for Digital Images 30
A Call for Holistic Approach to Defence Transparency in South East Europe 2
A Clustering Method for Information Summarization and Modelling a Subject Domain 96
A Concept for Establishing a Security Operations and Training Centre at the Bulgarian Naval Academy 34
A Copy Attack on Robust Digital Watermarking in Multi Domain for the Stego Images 8
A Cost-Effective Approach to Securing Systems through Partial Decentralization 53
A Cyber Range for Armed Forces Education 70
A Digital Twin for the Logistics System of a Manufacturing Enterprise Using Industrial IoT 79
A Framework Methodology to Support the Selection of a Multipurpose Fighter 12
A Generalization of the Classic Combination Rules to DSm Hyper-power Sets 10
A Generic Reference Curriculum on Cybersecurity 11
A Governance Model for an EU Cyber Security Collaborative Network – ECSCON 70
A Governance Model of a Collaborative Networked Organization for Cybersecurity Research 76
A Human Rights and Ethical Lens on Security and Human Dignity: The Case Study of Syrian Asylum Seekers 7
A License Plate Recognition System in e-Government 7
A Logical Model for Multi-Sector Cyber Risk Management 123
A MATLAB Tool for Development and Testing of Track Initiation and Multiple Target Tracking Algorithms 9
A Means of Comparing Military Budgeting Processes in South East Europe 16
A Method for the Development of Cyber Security Strategies 17
A Method of Evaluating Assurance Requirements 8
A Model of a Cyber Defence Awareness System of Campaigns with Malicious Information 47
A Model of ICT Competence Development for Digital Transformation 74
A NATO Perspective on Challenges and Prospects for the Bulgarian Air Force 5
A New Class of Fusion Rules Based on T-Conorm and T-Norm Fuzzy Operators 8
A New Steganographic Algorithm for Hiding Messages in Music 118
A New Technique for Enhancing the Properties of Transmitted Data 4
A Novel Lower Cost Crypto-Scheme Based on the Theory of Sharing Secrets 3
A Robust Remote User Authentication Scheme using Smart Card 15
A Secure Online Medical Information System in Distributed and Heterogeneous Computing Environment 6
A Security Approach to a Military Autonomous Platform Path Planning 41
A Small Step toward Interoperability 8
A Software Agent-based Collaborative Approach for Humanitarian-Assistance Scenarios 9
A Software Tool ASR for a posteriori Cryptanalysis on Public Keys Generated with ‘RSA’ 17
A South-East European Defence Transparency Audit 7
A Study of Orbital Carrier Rocket and Spacecraft Failures: 2000-2009 14
A System-of-Systems Approach for the Creation of a Composite Cyber Range for Cyber/Hybrid Exercising 43
A System-of-Systems Approach to Cyber Security and Resilience 58
A Terrain Reasoning Algorithm for Defending a Fire Zone 7
A Visual Tool to Simplify the Building of Distributed Simulations Using HLA 5
Achieving Interoperability of Command and Control Systems Using Translation Gateways 3
Acquisition in a Large IT Organization 14
ADL websites - Useful sites, portals, and forums 3
Adopting Machine Learning for Images Transferred with LoRaWAN 38
Advanced Distance Learning for Training National Peacekeeping Forces 3